Milad Nasr

According to our database1, Milad Nasr authored at least 46 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The Last Iterate Advantage: Empirical Auditing and Principled Heuristic Analysis of Differentially Private SGD.
CoRR, 2024

Avoiding Generative Model Writer's Block With Embedding Nudging.
CoRR, 2024

Phantom: General Trigger Attacks on Retrieval Augmented Language Generation.
CoRR, 2024

Query-Based Adversarial Prompt Generation.
CoRR, 2024

Private Fine-tuning of Large Language Models with Zeroth-order Optimization.
CoRR, 2024

Privacy Side Channels in Machine Learning Systems.
Proceedings of the 33rd USENIX Security Symposium, 2024

Synthetic Query Generation for Privacy-Preserving Deep Retrieval Systems using Differentially Private Language Models.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024

Auditing Private Prediction.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Stealing part of a production language model.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
Federated Ensemble Learning: Increasing the Capacity of Label Private Recommendation Systems.
IEEE Data Eng. Bull., 2023

Scalable Extraction of Training Data from (Production) Language Models.
CoRR, 2023

Report of the 1st Workshop on Generative AI and Law.
CoRR, 2023

Are aligned neural networks adversarially aligned?
CoRR, 2023

Privacy-Preserving Recommender Systems with Synthetic Query Generation using Differentially Private Large Language Models.
CoRR, 2023

Students Parrot Their Teachers: Membership Inference on Model Distillation.
CoRR, 2023

Tight Auditing of Differentially Private Machine Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Extracting Training Data from Diffusion Models.
Proceedings of the 32nd USENIX Security Symposium, 2023

Students Parrot Their Teachers: Membership Inference on Model Distillation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Are aligned neural networks adversarially aligned?
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Privacy Auditing with One (1) Training Run.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Preventing Generation of Verbatim Memorization in Language Models Gives a False Sense of Privacy.
Proceedings of the 16th International Natural Language Generation Conference, 2023

Reverse-Engineering Decoding Strategies Given Blackbox Access to a Language Generation System.
Proceedings of the 16th International Natural Language Generation Conference, 2023

Effectively Using Public Data in Privacy Preserving Machine Learning.
Proceedings of the International Conference on Machine Learning, 2023

Why Is Public Pretraining Necessary for Private Model Training?
Proceedings of the International Conference on Machine Learning, 2023

2022
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks.
Proc. Priv. Enhancing Technol., 2022

Preventing Verbatim Memorization in Language Models Gives a False Sense of Privacy.
CoRR, 2022

No Free Lunch in "Privacy for Free: How does Dataset Condensation Help Privacy".
CoRR, 2022

FEL: High Capacity Learning for Recommendation and Ranking via Federated Ensemble Learning.
CoRR, 2022

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture.
Proceedings of the 31st USENIX Security Symposium, 2022

Membership Inference Attacks From First Principles.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind Adversarial Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021

Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Improving Deep Learning with Differential Privacy using Gradient Encoding and Denoising.
CoRR, 2020

Blind Adversarial Network Perturbations.
CoRR, 2020

MassBrowser: Unblocking the Censored Web for the Masses, by the Masses.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Bidding strategies with gender nondiscrimination constraints for online ad auctions.
Proceedings of the FAT* '20: Conference on Fairness, 2020

2019
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Comprehensive Privacy Analysis of Deep Learning: Stand-alone and Federated Learning under Passive and Active White-box Inference Attacks.
CoRR, 2018

Machine Learning with Membership Privacy using Adversarial Regularization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution.
CoRR, 2017

The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016


  Loading...