Teodora Baluta

Orcid: 0000-0003-3655-9810

According to our database1, Teodora Baluta authored at least 12 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
User-Customizable Transpilation of Scripting Languages.
Proc. ACM Program. Lang., April, 2023

User-customizable Transpilation of Scripting Languages.
CoRR, 2023

Explaining SAT Solving Using Causal Reasoning.
Proceedings of the 26th International Conference on Theory and Applications of Satisfiability Testing, 2023

Unforgeability in Stochastic Gradient Descent.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
LPGNet: Link Private Graph Networks for Node Classification.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Membership Inference Attacks and Generalization: A Causal Perspective.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
SynGuar: guaranteeing generalization in programming by example.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Scalable Quantitative Verification For Deep Neural Networks.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Private Hierarchical Clustering in Federated Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2019
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Quantitative Verification of Neural Networks and Its Security Applications.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2017
Modeling the effects of insider threats on cybersecurity of complex systems.
Proceedings of the 2017 Winter Simulation Conference, 2017


  Loading...