Suman Jana
Orcid: 0000-0003-3518-4877Affiliations:
- Columbia University, New York, NY, USA
- University of Texas at Austin, TX, USA
- University of Utah, Salt Lake City, UT, USA
According to our database1,
Suman Jana
authored at least 91 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on github.com
-
on sumanj.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. ACM Program. Lang., 2024
CoRR, 2024
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain.
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Software Eng., April, 2023
Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2023
An Improved Parametric Method for Selecting Different Types of Tesla Transformer Primary Coil to Construct an Artificial Lightning Simulator.
IEEE Access, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification.
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
StateFormer: fine-grained type recovery from binaries using generative state modeling.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation, 2021
Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Robustness Verification.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers.
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures.
IEEE Open J. Comput. Soc., 2020
CoRR, 2020
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 8th International Conference on Learning Representations, 2020
2019
Grand Challenges of Resilience: Autonomous System Resilience through Design and Runtime Measures.
CoRR, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
On the Connection between Differential Privacy and Adversarial Robustness in Machine Learning.
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the 40th International Conference on Software Engineering, 2018
2017
Towards Practical Verification of Machine Learning: The Case of Computer Vision Systems.
CoRR, 2017
HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
CoRR, 2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
IEEE Trans. Mob. Comput., 2013
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
The most dangerous code in the world: validating SSL certificates in non-browser software.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 3rd USENIX Workshop on Hot Topics in Cloud Computing, 2011
2010
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements.
IEEE Trans. Mob. Comput., 2010
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews.
IEEE Trans. Mob. Comput., 2010
2009
On the effectiveness of secret key extraction from wireless signal strength in real environments.
Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, 2009