Matt Fredrikson
Orcid: 0000-0003-1820-1698
According to our database1,
Matt Fredrikson
authored at least 88 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
VeriSplit: Secure and Practical Offloading of Machine Learning Inferences across IoT Devices.
CoRR, 2024
CoRR, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
2023
CoRR, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
2022
Trans. Mach. Learn. Res., 2022
Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning.
Comput. Secur., 2022
Privacy-Preserving Case-Based Explanations: Enabling Visual Interpretability by Protecting Privacy.
IEEE Access, 2022
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Software Verification and Formal Methods for ML-Enabled Autonomous Systems, 2022
2021
Self-Repairing Neural Networks: Provable Safety for Deep Networks via Dynamic Repair.
CoRR, 2021
Proceedings of the Verification, Model Checking, and Abstract Interpretation, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the NeurIPS 2021 Competitions and Demonstrations Track, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the FAccT '21: 2021 ACM Conference on Fairness, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
2020
Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning.
J. Comput. Secur., 2020
Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proceedings of the FAT* '20: Conference on Fairness, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
Influence Paths for Characterizing Subject-Verb Number Agreement in LSTM Language Models.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
2019
Proceedings of the 7th International Conference on Learning Representations, 2019
2018
Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the IEEE International Test Conference, 2018
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
CoRR, 2017
PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage.
CoRR, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences.
CoRR, 2015
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2012
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012
2011
Proceedings of the Moving Target Defense, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Link Mining: Models, Algorithms, and Applications, 2010
2009
2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008