Esha Sarkar

Orcid: 0000-0002-4473-7368

According to our database1, Esha Sarkar authored at least 18 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
TRAPDOOR: Repurposing neural network backdoors to detect dataset bias in machine learning-based genomic analysis.
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023

PerDoor: Persistent Backdoors in Federated Learning using Adversarial Perturbations.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

2022
FaceHack: Attacking Facial Recognition Systems Using Malicious Facial Characteristics.
IEEE Trans. Biom. Behav. Identity Sci., 2022

PerDoor: Persistent Non-Uniform Backdoors in Federated Learning using Adversarial Perturbations.
CoRR, 2022

Scalable privacy-preserving cancer type prediction with homomorphic encryption.
CoRR, 2022

PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks.
CoRR, 2022

2021
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-Based Traffic Congestion Control Systems.
IEEE Trans. Inf. Forensics Secur., 2021

TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis.
CoRR, 2021

Explainability Matters: Backdoor Attacks on Medical Imaging.
CoRR, 2021

Fast and Scalable Private Genotype Imputation Using Machine Learning and Partially Homomorphic Encryption.
IEEE Access, 2021

Remote Non-Intrusive Malware Detection for PLCs based on Chain of Trust Rooted in Hardware.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting.
IEEE Des. Test, 2020

FaceHack: Triggering backdoored facial recognition systems using facial characteristics.
CoRR, 2020

Watch your back: Backdoor Attacks in Deep Reinforcement Learning-based Autonomous Vehicle Control Systems.
CoRR, 2020

Practical Data-in-Use Protection Using Binary Decision Diagrams.
IEEE Access, 2020

I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
On automating delayered IC analysis for hardware IP protection.
Proceedings of the International Conference on Omni-Layer Intelligent Systems, 2019

2017
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys.
IEEE Des. Test, 2017


  Loading...