On cryptography with auxiliary input Y Dodis, YT Kalai, S Lovett Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009 | 248 | 2009 |

Non-malleable codes from additive combinatorics D Aggarwal, Y Dodis, S Lovett SIAM Journal on Computing 47 (2), 524-546, 2018 | 154 | 2018 |

Constructive discrepancy minimization by walking on the edges S Lovett, R Meka SIAM Journal on Computing 44 (5), 1573-1582, 2015 | 143 | 2015 |

Unconditional pseudorandom generators for low degree polynomials S Lovett Proceedings of the fortieth annual ACM symposium on Theory of computing, 557-562, 2008 | 86 | 2008 |

Worst case to average case reductions for polynomials T Kaufman, S Lovett 2008 49th Annual IEEE Symposium on Foundations of Computer Science, 166-175, 2008 | 73 | 2008 |

Inverse conjecture for the Gowers norm is false S Lovett, R Meshulam, A Samorodnitsky Proceedings of the fortieth annual ACM symposium on Theory of computing, 547-556, 2008 | 68 | 2008 |

Bilinear classes: A structural framework for provable generalization in rl S Du, S Kakade, J Lee, S Lovett, G Mahajan, W Sun, R Wang International Conference on Machine Learning, 2826-2836, 2021 | 64 | 2021 |

Rectangles are nonnegative juntas M Goos, S Lovett, R Meka, T Watson, D Zuckerman SIAM Journal on Computing 45 (5), 1835-1869, 2016 | 63 | 2016 |

Subspace evasive sets Z Dvir, S Lovett Proceedings of the forty-fourth annual ACM symposium on Theory of computing …, 2012 | 62 | 2012 |

Rectangles are nonnegative juntas M Göös, S Lovett, R Meka, T Watson, D Zuckerman Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015 | 61 | 2015 |

Weight distribution and list-decoding size of reed–muller codes T Kaufman, S Lovett, E Porat IEEE transactions on information theory 58 (5), 2689-2696, 2012 | 61 | 2012 |

Improved bounds for the sunflower lemma R Alweiss, S Lovett, K Wu, J Zhang Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing …, 2020 | 60 | 2020 |

Algebraic attacks against random local functions and their countermeasures B Applebaum, S Lovett SIAM Journal on Computing 47 (1), 52-79, 2018 | 60 | 2018 |

Communication is bounded by root of rank S Lovett Journal of the ACM (JACM) 63 (1), 1-9, 2016 | 55 | 2016 |

Structure of protocols for XOR functions H Hatami, K Hosseini, S Lovett SIAM Journal on Computing 47 (1), 208-217, 2018 | 52 | 2018 |

Active classification with comparison queries DM Kane, S Lovett, S Moran, J Zhang 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS …, 2017 | 51 | 2017 |

Every locally characterized affine-invariant property is testable A Bhattacharyya, E Fischer, H Hatami, P Hatami, S Lovett Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013 | 50 | 2013 |

Pseudorandom generators from polarizing random walks E Chattopadhyay, P Hatami, K Hosseini, S Lovett Theory of Computing 15 (1), 1-26, 2019 | 46 | 2019 |

The Gram-Schmidt walk: a cure for the Banaszczyk blues N Bansal, D Dadush, S Garg, S Lovett Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing …, 2018 | 44 | 2018 |

0-1 integer linear programming with a linear number of constraints R Impagliazzo, S Lovett, R Paturi, S Schneider arXiv preprint arXiv:1401.5512, 2014 | 43 | 2014 |