Prateek Mittal
Orcid: 0000-0002-4057-0118
According to our database1,
Prateek Mittal
authored at least 218 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Neural Network Design for Impedance Modeling of Power Electronic Systems Based on Latent Features.
IEEE Trans. Neural Networks Learn. Syst., May, 2024
SORRY-Bench: Systematically Evaluating Large Language Model Safety Refusal Behaviors.
CoRR, 2024
CoRR, 2024
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses.
Proceedings of the 33rd USENIX Security Symposium, 2024
Assessing the Brittleness of Safety Alignment via Pruning and Low-Rank Modifications.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Proc. Priv. Enhancing Technol., July, 2023
Better wind forecasting using Evolutionary Neural Architecture search driven Green Deep Learning.
Expert Syst. Appl., 2023
Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation.
CoRR, 2023
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023
Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Differentially Private Image Classification by Learning Priors from Random Processes.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Proc. Priv. Enhancing Technol., 2022
Proc. Priv. Enhancing Technol., 2022
CoRR, 2022
Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations.
CoRR, 2022
Reviews in motion: a large scale, longitudinal study of review recommendations on Yelp.
CoRR, 2022
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Security and Privacy, 2022
Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the International Conference on Machine Learning, 2022
Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality.
IEEE Trans. Dependable Secur. Comput., 2021
Proc. Priv. Enhancing Technol., 2021
CoRR, 2021
DP-cryptography: marrying differential privacy and cryptography in emerging applications.
Commun. ACM, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures.
IEEE Open J. Comput. Soc., 2020
CoRR, 2020
Time for a Background Check! Uncovering the impact of Background Features on Deep Neural Networks.
CoRR, 2020
PatchGuard: Provable Defense against Adversarial Patches Using Masks on Small Receptive Fields.
CoRR, 2020
Proceedings of the Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Dataset, September, 2019
IEEE Trans. Dependable Secur. Comput., 2019
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019
Proc. Priv. Enhancing Technol., 2019
Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing.
Proc. Priv. Enhancing Technol., 2019
Proc. Priv. Enhancing Technol., 2019
Proc. Priv. Enhancing Technol., 2019
Proc. ACM Meas. Anal. Comput. Syst., 2019
Grand Challenges of Resilience: Autonomous System Resilience through Design and Runtime Measures.
CoRR, 2019
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples.
CoRR, 2019
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the 36th International Conference on Machine Learning, 2019
Variable Grid Resolution based Evolutionary Multi-objective optimization towards Micro-siting.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Comparative Study of Multi/Many-Objective Evolutionary Algorithms on Hot Rolling Application.
Proceedings of the Optimization in Industry, Present Practices and Future Scopes., 2019
2018
IEEE Trans. Multi Scale Comput. Syst., 2018
Proc. Priv. Enhancing Technol., 2018
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers.
Proc. Priv. Enhancing Technol., 2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
CoRR, 2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Learning Informative and Private Representations via Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
CoRR, 2017
Coupling Dimensionality Reduction with Generative Model for Non-Interactive Private Data Release.
CoRR, 2017
CoRR, 2017
CoRR, 2017
Dimensionality Reduction as a Defense against Evasion Attacks on Machine Learning Classifiers.
CoRR, 2017
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey.
IEEE Commun. Surv. Tutorials, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
Proceedings of the Information Systems Security and Privacy, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the 2017 IEEE International Symposium on High Performance Computer Architecture, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
On the Simultaneous Preservation of Privacy and Community Structure in Anonymized Networks.
CoRR, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 26th IEEE International Workshop on Machine Learning for Signal Processing, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the Fourth AAAI Conference on Human Computation and Crowdsourcing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE J. Sel. Top. Signal Process., 2015
CoRR, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Proceedings of the 24th USENIX Security Symposium, 2015
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 13th ACM Workshop on Hot Topics in Networks, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
2012
ACM Trans. Inf. Syst. Secur., 2012
The Integration of Biological Pathway Knowledge in Cancer Genomics: A review of existing computational approaches.
IEEE Signal Process. Mag., 2012
DECENT: A decentralized architecture for enforcing privacy in online social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Evolution of social-attribute networks: measurements, modeling, and implications using google+.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012
Cachet: a decentralized architecture for privacy preserving social networking with caching.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012
2011
CoRR, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
EASiER: encryption-based access control in social networks with efficient revocation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007