Publications
The Order Effect: Investigating Prompt Sensitivity in Closed-Source LLMs. Feb 2025, Arxiv
ClaimVer: Explainable Claim-Level Verification and Evidence Attribution of Text Through Knowledge Graphs. EMNLP 2024.
AuditLLM: A Tool for Auditing Large Language Models Using Multiprobe Approach CS Maryam Amirizaniani, Tanya Roosta, Aman Chadha The Conference on Information and Knowledge Management (CIKM) 2024
What is Lost in Knowledge Distillation? Peyman Passban Manas Mohanty, Tanya Roosta NeurIPS 2023 3rd Workshop on Efficient Natural Language and Speech Processing 2023
Once-for-All Federated Learning: Learning from and Deploying to Heterogeneous Clients TZ Kamala Varma, Enmao Diao, Tanya Roosta, Jie Ding FL NeurIPS 2023
Quantifying Catastrophic Forgetting in Continual Federated Learning SA Christophe Dupuy, Jimit Majmudar, Jixuan Wang, Tanya Roosta, Rahul Gupta 2023 IEEE International Conference on Acoustics, Speech and Signal Processing 2023
Data Augmentation and Model Ensembling for Detection of Online Sexism. Feely, W., Gupta, P., Mohanty, M. R., Chon, T., Kundu, T., Singh, V., Atluri, S., Roosta, T., Ghaderi, V., & Schulam. Proceedings of the 17th International Workshop on Semantic Evaluation (SemEval-2023)
Training Mixed-Domain Translation Models via Federated Learning CC Peyman Passban, Tanya Roosta, Rahul Gupta, Ankit Chadha North American Chapter of Association for Computational Linguistics (NAACL) 2022
PerFedSI: A Framework for Personalized Federated Learning with Side Information TZ Liam Collins, Enmao Diao, Tanya Roosta, Jie Ding FL-NeurIPS 2022 2022
Learning from Federated Learning in Real World SA Christophe Dupuy, Tanya G. Roosta, Leo Long, Clement Chung, Rahul Gupta 2022 IEEE International Conference on Acoustics, Speech and Signal Processing 2022
Communication-Efficient Federated Learning for Neural Machine Translation AC Tanya Roosta, Peyman Passban NeurIPS 2021 Efficient Natural Language and Speech Processing (ENLSP) 2021
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems Alavaro Cardenas, T Roosta, S Sastry Ad Hoc Networks 7 (8), 1434-1447 142 2009
An intrusion detection system for wireless process control systems T Roosta, DK Nilsson, U Lindqvist, A Valdes 2008 5th IEEE international conference on mobile ad hoc and sensor systems 52 2008
Convergence analysis of reweighted sum-product algorithms TG Roosta, MJ Wainwright, Shankar S Sastry IEEE Transactions on Signal Processing 56 (9), 4293-4305 57 2008
Transactional confidentiality in sensor networks S Pai, M Meingast, T Roosta, S Bermudez, SB Wicker, DK Mulligan IEEE Security & Privacy 6 (4), 28-35 60 2008
Confidentiality in sensor networks: Transactional information S Pai, M Meingast, T Roosta, S Bermudez, S Wicker, DK Mulligan IEEE Security and Privacy magazine 19 2008
A testbed for secure and robust SCADA systems A Giani, G Karsai, T Roosta, A Shah, B Sinopoli, J Wiley ACM SIGBED Review 5 (2), 1-4 117 2008
Ph.D. Dissertation Attacks and defenses of ubiquitous sensor networks Tanya Roosta, Advisor: Shankar Sastry Electrical Engineering and Computer Science University of California Berkeley 5/2008
Testbed implementation of a secure flooding time synchronization protocol T Roosta, WC Liao, WC Teng, S Sastry 2008 IEEE Wireless Communications and Networking Conference, 3157-3162 15 2008
Key management and secure software updates in wireless process control environments Denis K Nilsson, T Roosta, U Lindqvist, Alavaro Valdes Proceedings of the first ACM conference on Wireless network security, 100-108 165 2008
Integrity checker for wireless sensor networks in health care applications Anarita Giani, Tanya Roosta, Shankar Sastry 2008 Second International Conference on Pervasive Computing Technologies for … 15 2008
Rethinking security properties, threat models, and the design space in sensor networks Alvaro Cardenas, Tanya Roosta, Shankar Sastry Computer Communication Review (CCR), the publication of the ACM 3 2008
Cyber security basic defenses and attack trends Alavaro Cárdenas, Tanya Roosta, G Taban, S Sastry Homeland Security Technology Challenges, 73-101 13 2008
Inherent security of routing protocols in ad-hoc and sensor networks Tanya Roosta, S Pai, P Chen, Shankar Sastry, Stephen Wicker IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 1273-1278 20 2007
Consideration of security in telehealth wireless sensor network monitoring systems J Adams, T Roosta, JM Eklund, R Bajcsy, S Sastry Proceeding of the third International Conference on Telehealth IASTED 4 2007
Using social network theory towards development of wireless ad hoc network trust S Pai, T Roosta, S Wicker, S Sastry 21st International Conference on Advanced Information Networking and … 20 2007
Time synchronization attacks in sensor networks T Roosta, M Manzo, S Sastry Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc … 4 2007
Taxonomy of security attacks in sensor networks and countermeasures T Roosta, S Shieh, S Sastry The first IEEE international conference on system integration and … 166 2006
Securing flooding time synchronization protocol in sensor networks T Roosta, S Sastry First International Workshop on Embedded Systems Security 10 2006
Robust estimation and detection in ad hoc and sensor networks T Roosta, SM Mishra, A Ghazizadeh 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 236-245 15 2006
Security and privacy issues with health care information technology M Meingast, T Roosta, S Sastry 2006 international conference of the IEEE engineering in medicine and … 485 2006
Distributed reputation system for tracking applications in sensor networks T Roosta, M Meingast, S Sastry 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems … 32 2006
Instrumenting wireless sensor networks for real-time surveillance S Sastry, M Manzo, S Oh, P Chen Proceedings 2006 IEEE International Conference on Robotics and Automation … 128 2006
Time synchronization attacks in sensor networks M Manzo, T Roosta, S Sastry Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor … 170 2005
Probabilistic geographic routing protocol for ad hoc and sensor networks T Roosta, M Menzo, S Sastry Proceeding (474) wireless networks and emerging technologies 79 2005
Robust Estimation and Detection SM Mishra, T Roosta, A Ghazizadeh
Masters Thesis: Neighborhood Creation for Ad Hoc Networks Tanya Roosta Department of EECS, UC Berkeley