Seguir
Prateek Mittal
Título
Citado por
Citado por
Ano
Advances and open problems in federated learning
P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ...
Foundations and Trends® in Machine Learning 14 (1–2), 1-210, 2021
22462021
Sybilinfer: Detecting sybil nodes using social networks.
G Danezis, P Mittal
Ndss, 1-15, 2009
5962009
EASiER: Encryption-based access control in social networks with efficient revocation
S Jahid, P Mittal, N Borisov
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
5802011
Analyzing federated learning through an adversarial lens
AN Bhagoji, S Chakraborty, P Mittal, S Calo
International Conference on Machine Learning, 634-643, 2019
5162019
{BotGrep}: Finding {P2P} Bots with Structured Graph Analysis
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
19th USENIX Security Symposium (USENIX Security 10), 2010
3202010
{BlackIoT}:{IoT} Botnet of High Wattage Devices Can Disrupt the Power Grid
S Soltan, P Mittal, HV Poor
27th USENIX Security Symposium (USENIX Security 18), 15-32, 2018
2592018
Evolution of social-attribute networks: measurements, modeling, and implications using google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
Proceedings of the 2012 internet measurement conference, 131-144, 2012
2522012
Denial of service or denial of security?
N Borisov, G Danezis, P Mittal, P Tabriz
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2332007
{RAPTOR}: Routing attacks on privacy in tor
Y Sun, A Edmundson, L Vanbever, O Li, J Rexford, M Chiang, P Mittal
24th USENIX Security Symposium (USENIX Security 15), 271-286, 2015
2252015
Darts: Deceiving autonomous cars with toxic signs
C Sitawarin, AN Bhagoji, A Mosenia, M Chiang, P Mittal
arXiv preprint arXiv:1802.06430, 2018
2092018
Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples.
C Liu, S Chakraborty, P Mittal
NDSS 16, 21-24, 2016
1972016
Sybilbelief: A semi-supervised learning approach for structure-based sybil detection
NZ Gong, M Frank, P Mittal
IEEE Transactions on Information Forensics and Security 9 (6), 976-987, 2014
1872014
Enhancing robustness of machine learning systems via data transformations
AN Bhagoji, D Cullina, C Sitawarin, P Mittal
2018 52nd Annual Conference on Information Sciences and Systems (CISS), 1-5, 2018
1702018
DECENT: A decentralized architecture for enforcing privacy in online social networks
S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
1642012
Robustbench: a standardized adversarial robustness benchmark
F Croce, M Andriushchenko, V Sehwag, E Debenedetti, N Flammarion, ...
arXiv preprint arXiv:2010.09670, 2020
1602020
Dimensionality reduction as a defense against evasion attacks on machine learning classifiers
AN Bhagoji, D Cullina, P Mittal
arXiv preprint arXiv:1704.02654 2 (1), 2017
1572017
Cachet: a decentralized architecture for privacy preserving social networking with caching
S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia
Proceedings of the 8th international conference on Emerging networking …, 2012
1572012
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
P Mittal, A Khurshid, J Juen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
1322011
Privacy risks of securing machine learning models against adversarial examples
L Song, R Shokri, P Mittal
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1282019
{SecGraph}: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th USENIX Security Symposium (USENIX Security 15), 303-318, 2015
1252015
O sistema não pode efectuar a operação agora. Tente novamente mais tarde.
Artigos 1–20