Alina Oprea
Orcid: 0000-0002-4979-5292Affiliations:
- Northeastern University, Boston, MA, USA
According to our database1,
Alina Oprea
authored at least 99 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
SleeperNets: Universal Backdoor Poisoning Attacks Against Reinforcement Learning Agents.
CoRR, 2024
CoRR, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Appl. Netw. Sci., December, 2023
ACM Trans. Internet Things, August, 2023
How to Combine Membership-Inference Attacks on Multiple Updated Machine Learning Models.
Proc. Priv. Enhancing Technol., July, 2023
Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning.
ACM Comput. Surv., 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware Classifiers.
Proceedings of the IEEE Military Communications Conference, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
ACM Trans. Priv. Secur., 2022
IACR Cryptol. ePrint Arch., 2022
Computer, 2022
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems.
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models.
IEEE Trans. Inf. Forensics Secur., 2021
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems.
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
2019
CoRR, 2019
Playing Adaptively Against Stealthy Opponents: A Reinforcement Learning Strategy for the FlipIt Security Game.
CoRR, 2019
Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation.
CoRR, 2019
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019
Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 36th International Conference on Machine Learning, 2019
\mathsf QFlip : An Adaptive Reinforcement Learning Strategy for the \mathsf FlipIt Security Game.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks.
CoRR, 2018
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Automated Generation and Selection of Interpretable Features for Enterprise Security.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Catching predators at watering holes: finding and understanding strategically compromised websites.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Efficient software implementations of large finite fields <i>GF</i>(2<sup><i>n</i></sup>) for secure storage applications.
ACM Trans. Storage, 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 8th USENIX Conference on File and Storage Technologies, 2010
2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2008
2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Dynamic range enhancement of consumer digital camera acquired hip prosthesis X-ray images.
Proceedings of the 15th European Signal Processing Conference, 2007
2006
Proceedings of the Distributed Computing, 20th International Symposium, 2006
2005
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003