Publications

The Order Effect: Investigating Prompt Sensitivity in Closed-Source LLMs. Feb 2025, Arxiv

ClaimVer: Explainable Claim-Level Verification and Evidence Attribution of Text Through Knowledge Graphs. EMNLP 2024.

AuditLLM: A Tool for Auditing Large Language Models Using Multiprobe Approach CS Maryam Amirizaniani, Tanya Roosta, Aman Chadha The Conference on Information and Knowledge Management (CIKM) 2024

What is Lost in Knowledge Distillation? Peyman Passban Manas Mohanty, Tanya Roosta NeurIPS 2023 3rd Workshop on Efficient Natural Language and Speech Processing 2023

Once-for-All Federated Learning: Learning from and Deploying to Heterogeneous Clients TZ Kamala Varma, Enmao Diao, Tanya Roosta, Jie Ding FL NeurIPS 2023

Quantifying Catastrophic Forgetting in Continual Federated Learning SA Christophe Dupuy, Jimit Majmudar, Jixuan Wang, Tanya Roosta, Rahul Gupta 2023 IEEE International Conference on Acoustics, Speech and Signal Processing 2023

Data Augmentation and Model Ensembling for Detection of Online Sexism. Feely, W., Gupta, P., Mohanty, M. R., Chon, T., Kundu, T., Singh, V., Atluri, S., Roosta, T., Ghaderi, V., & Schulam. Proceedings of the 17th International Workshop on Semantic Evaluation (SemEval-2023)

Training Mixed-Domain Translation Models via Federated Learning CC Peyman Passban, Tanya Roosta, Rahul Gupta, Ankit Chadha North American Chapter of Association for Computational Linguistics (NAACL) 2022

PerFedSI: A Framework for Personalized Federated Learning with Side Information TZ Liam Collins, Enmao Diao, Tanya Roosta, Jie Ding FL-NeurIPS 2022 2022

Learning from Federated Learning in Real World SA Christophe Dupuy, Tanya G. Roosta, Leo Long, Clement Chung, Rahul Gupta 2022 IEEE International Conference on Acoustics, Speech and Signal Processing 2022

Communication-Efficient Federated Learning for Neural Machine Translation AC Tanya Roosta, Peyman Passban NeurIPS 2021 Efficient Natural Language and Speech Processing (ENLSP) 2021

Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems Alavaro Cardenas, T Roosta, S Sastry Ad Hoc Networks 7 (8), 1434-1447 142 2009

An intrusion detection system for wireless process control systems T Roosta, DK Nilsson, U Lindqvist, A Valdes 2008 5th IEEE international conference on mobile ad hoc and sensor systems 52 2008

Convergence analysis of reweighted sum-product algorithms TG Roosta, MJ Wainwright, Shankar S Sastry IEEE Transactions on Signal Processing 56 (9), 4293-4305 57 2008

Transactional confidentiality in sensor networks S Pai, M Meingast, T Roosta, S Bermudez, SB Wicker, DK Mulligan IEEE Security & Privacy 6 (4), 28-35 60 2008

Confidentiality in sensor networks: Transactional information S Pai, M Meingast, T Roosta, S Bermudez, S Wicker, DK Mulligan IEEE Security and Privacy magazine 19 2008

A testbed for secure and robust SCADA systems A Giani, G Karsai, T Roosta, A Shah, B Sinopoli, J Wiley ACM SIGBED Review 5 (2), 1-4 117 2008

Ph.D. Dissertation Attacks and defenses of ubiquitous sensor networks Tanya Roosta, Advisor: Shankar Sastry Electrical Engineering and Computer Science University of California Berkeley 5/2008

Testbed implementation of a secure flooding time synchronization protocol T Roosta, WC Liao, WC Teng, S Sastry 2008 IEEE Wireless Communications and Networking Conference, 3157-3162 15 2008

Key management and secure software updates in wireless process control environments Denis K Nilsson, T Roosta, U Lindqvist, Alavaro Valdes Proceedings of the first ACM conference on Wireless network security, 100-108 165 2008

Integrity checker for wireless sensor networks in health care applications Anarita Giani, Tanya Roosta, Shankar Sastry 2008 Second International Conference on Pervasive Computing Technologies for … 15 2008

Rethinking security properties, threat models, and the design space in sensor networks Alvaro Cardenas, Tanya Roosta, Shankar Sastry Computer Communication Review (CCR), the publication of the ACM 3 2008

Cyber security basic defenses and attack trends Alavaro Cárdenas, Tanya Roosta, G Taban, S Sastry Homeland Security Technology Challenges, 73-101 13 2008

Inherent security of routing protocols in ad-hoc and sensor networks Tanya Roosta, S Pai, P Chen, Shankar Sastry, Stephen Wicker IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 1273-1278 20 2007

Consideration of security in telehealth wireless sensor network monitoring systems J Adams, T Roosta, JM Eklund, R Bajcsy, S Sastry Proceeding of the third International Conference on Telehealth IASTED 4 2007

Using social network theory towards development of wireless ad hoc network trust S Pai, T Roosta, S Wicker, S Sastry 21st International Conference on Advanced Information Networking and … 20 2007

Time synchronization attacks in sensor networks T Roosta, M Manzo, S Sastry Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc … 4 2007

Taxonomy of security attacks in sensor networks and countermeasures T Roosta, S Shieh, S Sastry The first IEEE international conference on system integration and … 166 2006

Securing flooding time synchronization protocol in sensor networks T Roosta, S Sastry First International Workshop on Embedded Systems Security 10 2006

Robust estimation and detection in ad hoc and sensor networks T Roosta, SM Mishra, A Ghazizadeh 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 236-245 15 2006

Security and privacy issues with health care information technology M Meingast, T Roosta, S Sastry 2006 international conference of the IEEE engineering in medicine and … 485 2006

Distributed reputation system for tracking applications in sensor networks T Roosta, M Meingast, S Sastry 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems … 32 2006

Instrumenting wireless sensor networks for real-time surveillance S Sastry, M Manzo, S Oh, P Chen Proceedings 2006 IEEE International Conference on Robotics and Automation … 128 2006

Time synchronization attacks in sensor networks M Manzo, T Roosta, S Sastry Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor … 170 2005

Probabilistic geographic routing protocol for ad hoc and sensor networks T Roosta, M Menzo, S Sastry Proceeding (474) wireless networks and emerging technologies 79 2005

Robust Estimation and Detection SM Mishra, T Roosta, A Ghazizadeh

Masters Thesis: Neighborhood Creation for Ad Hoc Networks Tanya Roosta Department of EECS, UC Berkeley