Follow
Briland Hitaj
Title
Cited by
Cited by
Year
Deep models under the GAN: information leakage from collaborative deep learning
B Hitaj, G Ateniese, F Perez-Cruz
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
16112017
Passgan: A deep learning approach for password guessing
B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
Applied Cryptography and Network Security: 17th International Conference …, 2019
3342019
Evasion attacks against watermarking techniques found in MLaaS systems
D Hitaj, B Hitaj, LV Mancini
2019 Sixth International Conference on Software Defined Systems (SDS), 55-63, 2019
382019
No place to hide that bytes won’t reveal: Sniffing location-based encrypted traffic to track a user’s position
G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
242015
Scratch that! An evolution-based adversarial attack against neural networks
M Jere, L Rossi, B Hitaj, G Ciocarlie, G Boracchi, F Koushanfar
arXiv preprint arXiv:1912.02316, 2019
222019
Capture the bot: Using adversarial examples to improve captcha robustness to bot attacks
D Hitaj, B Hitaj, S Jajodia, LV Mancini
IEEE Intelligent Systems 36 (5), 104-112, 2020
192020
Adversarial scratches: Deployable attacks to CNN classifiers
L Giulivi, M Jere, L Rossi, F Koushanfar, G Ciocarlie, B Hitaj, G Boracchi
Pattern Recognition 133, 108985, 2023
162023
PassGPT: password modeling and (guided) generation with large language models
J Rando, F Perez-Cruz, B Hitaj
European Symposium on Research in Computer Security, 164-183, 2023
142023
MaleficNet: Hiding malware into deep neural networks using spread-spectrum channel coding
D Hitaj, G Pagnotta, B Hitaj, LV Mancini, F Perez-Cruz
European Symposium on Research in Computer Security, 425-444, 2022
122022
Fedcomm: Federated learning as a medium for covert communication
D Hitaj, G Pagnotta, B Hitaj, F Perez-Cruz, LV Mancini
IEEE Transactions on Dependable and Secure Computing, 2023
112023
Tattooed: A robust deep neural network watermarking scheme based on spread-spectrum channel coding
G Pagnotta, D Hitaj, B Hitaj, F Perez-Cruz, LV Mancini
arXiv preprint arXiv:2202.06091, 2022
62022
Do you trust your model? emerging malware threats in the deep learning ecosystem
D Hitaj, G Pagnotta, F De Gaspari, S Ruko, B Hitaj, LV Mancini, ...
arXiv preprint arXiv:2403.03593, 2024
42024
An Augmented MetiTarski Dataset for Real Quantifier Elimination Using Machine Learning
J Hester, B Hitaj, G Passmore, S Owre, N Shankar, E Yeh
International Conference on Intelligent Computer Mathematics, 297-302, 2023
42023
CoProver: A recommender system for proof construction
E Yeh, B Hitaj, S Owre, M Quemener, N Shankar
International Conference on Intelligent Computer Mathematics, 237-251, 2023
42023
Capturing the iccMAX calculator Element: A Case Study on Format Design
V Kothari, P Anantharaman, S Smith, B Hitaj, P Mundkur, N Shankar, L Li, ...
Proceedings of the IEEE Security and Privacy Workshops (SPW). IEEE, 2022
32022
Critical Infrastructure Security Goes to Space: Leveraging Lessons Learned on the Ground
T Ellis, B Hitaj, U Lindqvist, D Shands, L Tinnel, B DeBruhl
arXiv preprint arXiv:2309.15232, 2023
12023
System and process for generating passwords or password guesses
B Hitaj, G Ateniese, F Perez-Cruz, P Gasti
US Patent 11,669,612, 2023
12023
Trust in Motion: Capturing Trust Ascendancy in Open-Source Projects using Hybrid AI
H Sanchez, B Hitaj
arXiv preprint arXiv:2210.02656, 2022
12022
WHAT ARE GANS USEFUL FOR?
PM Olmos, B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
12018
What are GANs useful for?
B Hitaj, PM Olmos, P Gasti, G Ateniese, F Pérez-Cruz
1
The system can't perform the operation now. Try again later.
Articles 1–20