Shruti Tople
According to our database1,
Shruti Tople
authored at least 46 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting.
Proc. Priv. Enhancing Technol., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2024
2023
Trans. Mach. Learn. Res., 2023
Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective.
CoRR, 2023
CoRR, 2023
CoRR, 2023
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the International Conference on Machine Learning, 2023
2022
Trans. Mach. Learn. Res., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proc. Priv. Enhancing Technol., 2021
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
2020
Replication-Robust Payoff-Allocation with Applications in Machine Learning Marketplaces.
CoRR, 2020
To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers.
CoRR, 2020
Proceedings of the 37th International Conference on Machine Learning, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
CoRR, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2014
IACR Cryptol. ePrint Arch., 2014
2013
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013