Prateek Mittal

Orcid: 0000-0002-4057-0118

According to our database1, Prateek Mittal authored at least 220 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Neural Network Design for Impedance Modeling of Power Electronic Systems Based on Latent Features.
IEEE Trans. Neural Networks Learn. Syst., May, 2024

Adaptive and Stratified Subsampling Techniques for High Dimensional Non-Standard Data Environments.
CoRR, 2024

Instructional Segment Embedding: Improving LLM Safety with Instruction Hierarchy.
CoRR, 2024

Lottery Ticket Adaptation: Mitigating Destructive Interference in LLMs.
CoRR, 2024

Resilience of the Electric Grid through Trustable IoT-Coordinated Assets.
CoRR, 2024

SORRY-Bench: Systematically Evaluating Large Language Model Safety Refusal Behaviors.
CoRR, 2024

Data Shapley in One Training Run.
CoRR, 2024

Safety Alignment Should Be Made More Than Just a Few Tokens Deep.
CoRR, 2024

AI Risk Management Should Incorporate Both Safety and Security.
CoRR, 2024

Certifiably Robust RAG against Retrieval Corruption.
CoRR, 2024

Position Paper: Beyond Robustness Against Single Attack Types.
CoRR, 2024

Private Fine-tuning of Large Language Models with Zeroth-order Optimization.
CoRR, 2024

PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses.
Proceedings of the 33rd USENIX Security Symposium, 2024

Assessing the Brittleness of Safety Alignment via Pruning and Low-Rank Modifications.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

A New Linear Scaling Rule for Private Adaptive Hyperparameter Optimization.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Privacy-Preserving In-Context Learning for Large Language Models.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Teach LLMs to Phish: Stealing Private Information from Language Models.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

BrainLM: A foundation model for brain activity recordings.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

StableLev: Data-Driven Stability Enhancement for Multi-Particle Acoustic Levitation.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

Efficient Data Shapley for Weighted Nearest Neighbor Algorithms.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2024

Visual Adversarial Examples Jailbreak Aligned Large Language Models.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks.
Proc. Priv. Enhancing Technol., July, 2023

Better wind forecasting using Evolutionary Neural Architecture search driven Green Deep Learning.
Expert Syst. Appl., 2023

Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation.
CoRR, 2023

CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023

Visual Adversarial Examples Jailbreak Large Language Models.
CoRR, 2023

Differentially Private In-Context Learning.
CoRR, 2023

A Randomized Approach for Tight Privacy Accounting.
CoRR, 2023

QUICstep: Circumventing QUIC-based Censorship.
CoRR, 2023

Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker.
CoRR, 2023

Towards A Proactive ML Approach for Detecting Backdoor Poison Samples.
Proceedings of the 32nd USENIX Security Symposium, 2023

How Effective is Multiple-Vantage-Point Domain Control Validation?
Proceedings of the 32nd USENIX Security Symposium, 2023

ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A Light Recipe to Train Robust Vision Transformers.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023

A Randomized Approach to Tight Privacy Accounting.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

A Privacy-Friendly Approach to Data Valuation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Differentially Private Image Classification by Learning Priors from Random Processes.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Uncovering Adversarial Risks of Test-Time Adaptation.
Proceedings of the International Conference on Machine Learning, 2023

Effectively Using Public Data in Privacy Preserving Machine Learning.
Proceedings of the International Conference on Machine Learning, 2023

MultiRobustBench: Benchmarking Robustness Against Multiple Attacks.
Proceedings of the International Conference on Machine Learning, 2023

Revisiting the Assumption of Latent Separability for Backdoor Defenses.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

2022
Leveraging strategic connection migration-powered traffic splitting for privacy.
Proc. Priv. Enhancing Technol., 2022

Machine Learning with Differentially Private Labels: Mechanisms and Frameworks.
Proc. Priv. Enhancing Technol., 2022

Athena: Probabilistic Verification of Machine Unlearning.
Proc. Priv. Enhancing Technol., 2022

DP-RAFT: A Differentially Private Recipe for Accelerated Fine-Tuning.
CoRR, 2022

Understanding Robust Learning through the Lens of Representation Similarities.
CoRR, 2022

Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations.
CoRR, 2022

Circumventing Backdoor Defenses That Are Based on Latent Separability.
CoRR, 2022

Towards Reproducible Network Traffic Analysis.
CoRR, 2022

Reviews in motion: a large scale, longitudinal study of review recommendations on Yelp.
CoRR, 2022

Data-plane security applications in adversarial settings.
Comput. Commun. Rev., 2022

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture.
Proceedings of the 31st USENIX Security Symposium, 2022

QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework.
Proceedings of the 31st USENIX Security Symposium, 2022

Creating a Secure Underlay for the Internet.
Proceedings of the 31st USENIX Security Symposium, 2022

PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier.
Proceedings of the 31st USENIX Security Symposium, 2022

Parameterizing Activation Functions for Adversarial Robustness.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Formulating Robustness Against Unforeseen Attacks.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Understanding Robust Learning through the Lens of Representation Similarities.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Neurotoxin: Durable Backdoors in Federated Learning.
Proceedings of the International Conference on Machine Learning, 2022

Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?
Proceedings of the Tenth International Conference on Learning Representations, 2022

Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

Poster: Investigating QUIC's Potential Impact on Censorship Circumvention.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality.
IEEE Trans. Dependable Secur. Comput., 2021

Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning.
Proc. Priv. Enhancing Technol., 2021

Website Fingerprinting in the Age of QUIC.
Proc. Priv. Enhancing Technol., 2021

Advances and Open Problems in Federated Learning.
Found. Trends Mach. Learn., 2021

PatchGuard++: Efficient Provable Attack Detection against Adversarial Patches.
CoRR, 2021

Improving Adversarial Robustness Using Proxy Distributions.
CoRR, 2021

DP-cryptography: marrying differential privacy and cryptography in emerging applications.
Commun. ACM, 2021

Securing internet applications from routing attacks.
Commun. ACM, 2021

Systematic Evaluation of Privacy Risks of Machine Learning Models.
Proceedings of the 30th USENIX Security Symposium, 2021

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.
Proceedings of the 30th USENIX Security Symposium, 2021

PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking.
Proceedings of the 30th USENIX Security Symposium, 2021

RobustBench: a standardized adversarial robustness benchmark.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries.
Proceedings of the 38th International Conference on Machine Learning, 2021

SSD: A Unified Framework for Self-Supervised Outlier Detection.
Proceedings of the 9th International Conference on Learning Representations, 2021

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

New Directions in Automated Traffic Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Protecting the Grid Against MAD Attacks.
IEEE Trans. Netw. Sci. Eng., 2020

Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures.
IEEE Open J. Comput. Soc., 2020

RobustBench: a standardized adversarial robustness benchmark.
CoRR, 2020

Evaluating Snowflake as an Indistinguishable Censorship Circumvention Tool.
CoRR, 2020

nPrint: A Standard Data Representation for Network Traffic Analysis.
CoRR, 2020

A Critical Evaluation of Open-World Machine Learning.
CoRR, 2020

Time for a Background Check! Uncovering the impact of Background Features on Deep Neural Networks.
CoRR, 2020

Programmable In-Network Obfuscation of Traffic.
CoRR, 2020

PatchGuard: Provable Defense against Adversarial Patches Using Masks on Small Receptive Fields.
CoRR, 2020

Towards Probabilistic Verification of Machine Unlearning.
CoRR, 2020

On Pruning Adversarially Robust Neural Networks.
CoRR, 2020

Partial Recovery of Erdős-Rényi Graph Alignment via k-Core Alignment.
Proceedings of the Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems, 2020

HYDRA: Pruning Adversarially Robust Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Detecting Malware Injection with Program-DNS Behavior.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

CLAPS: Client-Location-Aware Path Selection in Tor.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Website Fingerprinting - Last Level Cache Contention Traces.
Dataset, September, 2019

De-SAG: On the De-Anonymization of Structure-Attribute Graph Data.
IEEE Trans. Dependable Secur. Comput., 2019

A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019

Guard Placement Attacks on Path Selection Algorithms for Tor.
Proc. Priv. Enhancing Technol., 2019

Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing.
Proc. Priv. Enhancing Technol., 2019

DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor.
Proc. Priv. Enhancing Technol., 2019

RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release.
Proc. Priv. Enhancing Technol., 2019

Partial Recovery of Erdðs-Rényi Graph Alignment via k-Core Alignment.
Proc. ACM Meas. Anal. Comput. Syst., 2019

Grand Challenges of Resilience: Autonomous System Resilience through Design and Runtime Measures.
CoRR, 2019

Advances and Open Problems in Federated Learning.
CoRR, 2019

Towards Compact and Robust Deep Neural Networks.
CoRR, 2019

Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples.
CoRR, 2019

A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019

VACCINE: Using Contextual Integrity For Data Leakage Detection.
Proceedings of the World Wide Web Conference, 2019

Robust Website Fingerprinting Through the Cache Occupancy Channel.
Proceedings of the 28th USENIX Security Symposium, 2019

Membership Inference Attacks Against Adversarially Robust Deep Learning Models.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Lower Bounds on Adversarial Robustness from Optimal Transport.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Analyzing Federated Learning through an Adversarial Lens.
Proceedings of the 36th International Conference on Machine Learning, 2019

Variable Grid Resolution based Evolutionary Multi-objective optimization towards Micro-siting.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

Privacy Risks of Securing Machine Learning Models against Adversarial Examples.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Analyzing the Robustness of Open-World Machine Learning.
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019

Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

SICO: Surgical Interception Attacks by Manipulating BGP Communities.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Comparative Study of Multi/Many-Objective Evolutionary Algorithms on Hot Rolling Application.
Proceedings of the Optimization in Industry, Present Practices and Future Scopes., 2019

2018
PinMe: Tracking a Smartphone User around the World.
IEEE Trans. Multi Scale Comput. Syst., 2018

Tempest: Temporal Dynamics in Anonymity Systems.
Proc. Priv. Enhancing Technol., 2018

Differentially Private Oblivious RAM.
Proc. Priv. Enhancing Technol., 2018

Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers.
Proc. Priv. Enhancing Technol., 2018

ProCMotive: Bringing Programmability and Connectivity into Isolated Vehicles.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

A Query Tool for Efficiently Investigating Risky Software Behaviors.
CoRR, 2018

Protecting the Grid against IoT Botnets of High-Wattage Devices.
CoRR, 2018

CensorSeeker: Generating a Large, Culture-Specific Blocklist for China.
CoRR, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
CoRR, 2018

PAC-learning in the presence of evasion adversaries.
CoRR, 2018

A Differential Privacy Mechanism Design Under Matrix-Valued Query.
CoRR, 2018

DARTS: Deceiving Autonomous Cars with Toxic Signs.
CoRR, 2018

Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos.
CoRR, 2018

BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.
Proceedings of the 27th USENIX Security Symposium, 2018

Automatically Generating a Large, Culture-Specific Blocklist for China.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Proceedings of the 27th USENIX Security Symposium, 2018

Bamboozling Certificate Authorities with BGP.
Proceedings of the 27th USENIX Security Symposium, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Adaptive Fog-Based Output Security for Augmented Reality.
Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, 2018

PAC-learning in the presence of adversaries.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Towards a Timely Causality Analysis for Enterprise Security.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Fundamental Limits of Database Alignment.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Blind source separation in the physical layer.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

Enhancing robustness of machine learning systems via data transformations.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

Acoustic Denial of Service Attacks on Hard Disk Drives.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

MVG Mechanism: Differential Privacy under Matrix-Valued Query.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Learning Informative and Private Representations via Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Acoustic Denial of Service Attacks on HDDs.
CoRR, 2017

The VACCINE Framework for Building DLP Systems.
CoRR, 2017

ProCMotive: Bringing Programability and Connectivity into Isolated Vehicles.
CoRR, 2017

Coupling Dimensionality Reduction with Generative Model for Non-Interactive Private Data Release.
CoRR, 2017

TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems.
CoRR, 2017

Inaudible Voice Commands.
CoRR, 2017

DEEProtect: Enabling Inference-based Access Control on Mobile Sensing Applications.
CoRR, 2017

Dimensionality Reduction as a Defense against Evasion Attacks on Machine Learning Classifiers.
CoRR, 2017

Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey.
IEEE Commun. Surv. Tutorials, 2017

Blind De-anonymization Attacks using Social Networks.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Using EEG-Based BCI Devices to Subliminally Probe for Private Information.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

How to Quantify Graph De-anonymization Risks.
Proceedings of the Information Systems Security and Privacy, 2017

Quantification of De-anonymization Risks in Social Networks.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks.
Proceedings of the 2017 IEEE International Symposium on High Performance Computer Architecture, 2017

POSTER: Inaudible Voice Commands.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Seed-Based De-Anonymizability Quantification of Social Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Root ORAM: A Tunable Differentially Private Oblivious RAM.
CoRR, 2016

Crowdsourcing Verifiable Contextual Integrity Norms.
CoRR, 2016

On the Simultaneous Preservation of Privacy and Community Structure in Anonymized Networks.
CoRR, 2016

Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Discriminant-component eigenfaces for privacy-preserving face recognition.
Proceedings of the 26th IEEE International Workshop on Machine Learning for Signal Processing, 2016

On the relative de-anonymizability of graph data: Quantification and evaluation.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms.
Proceedings of the Fourth AAAI Conference on Human Computation and Crowdsourcing, 2016

SmartWalk: Enhancing Social Network Security via Adaptive Random Walks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Optical Signal Processing and Stealth Transmission for Privacy.
IEEE J. Sel. Top. Signal Process., 2015

LinkMirage: How to Anonymize Links in Dynamic Social Systems.
CoRR, 2015

SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection.
CoRR, 2015

RAPTOR: Routing Attacks on Privacy in Tor.
Proceedings of the 24th USENIX Security Symposium, 2015

SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Proceedings of the 24th USENIX Security Symposium, 2015

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

ASPIRE: Iterative Specification Synthesis for Security.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Exploiting Temporal Dynamics in Sybil Defenses.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection.
IEEE Trans. Inf. Forensics Secur., 2014

Anonymity on QuickSand: Using BGP to Compromise Tor.
Proceedings of the 13th ACM Workshop on Hot Topics in Networks, 2014

Re<sup>3</sup>: relay reliability reputation for anonymity systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Subliminal Probing for Private Information via EEG-Based BCI Devices.
CoRR, 2013

Pisces: Anonymous Communication Using Social Networks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Preserving Link Privacy in Social Network Based Systems.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Trustworthy and scalable anonymous communication
PhD thesis, 2012

Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems.
ACM Trans. Inf. Syst. Secur., 2012

The Integration of Biological Pathway Knowledge in Cancer Genomics: A review of existing computational approaches.
IEEE Signal Process. Mag., 2012

SybilControl: Practical Sybil Defense with Computational Puzzles
CoRR, 2012

DECENT: A decentralized architecture for enforcing privacy in online social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Evolution of social-attribute networks: measurements, modeling, and implications using google+.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Cachet: a decentralized architecture for privacy preserving social networking with caching.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

2011
A Decentralized Architecture for Enforcing Privacy in Online Social Networks
CoRR, 2011

Towards Deployable DDoS Defense for Web Applications
CoRR, 2011

X-Vine: Secure and Pseudonymous Routing Using Social Networks
CoRR, 2011

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Proceedings of the 20th USENIX Security Symposium, 2011

Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

EASiER: encryption-based access control in social networks with efficient revocation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
BotGrep: Finding P2P Bots with Structured Graph Analysis.
Proceedings of the 19th USENIX Security Symposium, 2010

Scalable Anonymous Communication with Provable Security.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
SybilInfer: Detecting Sybil Nodes using Social Networks.
Proceedings of the Network and Distributed System Security Symposium, 2009

Securing Mediated Trace Access Using Black-box Permutation Analysis.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Fair K Mutual Exclusion Algorithm for Peer to Peer Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Denial of service or denial of security?
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007


  Loading...