Search

Your search keyword '"Asokan, N"' showing total 389 results

Search Constraints

Start Over You searched for: Author "Asokan, N" Remove constraint Author: "Asokan, N" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
389 results on '"Asokan, N"'

Search Results

1. Combining Machine Learning Defenses without Conflicts

2. Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations

3. BliMe Linter

4. Cancellable Memory Requests: A transparent, lightweight Spectre mitigation

5. Espresso: Robust Concept Filtering in Text-to-Image Models

6. SeMalloc: Semantics-Informed Memory Allocator

7. S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More

8. Data-Oblivious ML Accelerators using Hardware Security Extensions

9. The Spectre of Surveillance and Censorship in Future Internet Architectures

10. SoK: Unintended Interactions among Machine Learning Defenses and Risks

11. Attesting Distributional Properties of Training Data for Machine Learning

12. A User-centered Security Evaluation of Copilot

13. FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks

14. Parallel and Asynchronous Smart Contract Execution

15. GrOVe: Ownership Verification of Graph Neural Networks using Embeddings

16. False Claims against Model Ownership Resolution

17. On the Robustness of Dataset Inference

18. Towards cryptographically-authenticated in-memory data structures

19. Conflicting Interactions Among Protection Mechanisms for Machine Learning Models

20. BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking

21. Is GitHub's Copilot as Bad as Humans at Introducing Vulnerabilities in Code?

22. Color My World: Deterministic Tagging for Memory Safety

23. On the Effectiveness of Dataset Watermarking in Adversarial Settings

24. Do Transformers know symbolic rules, and would we know if they did?

25. SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning

26. Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses

27. Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Models

28. A little goes a long way: Improving toxic language classification despite data scarcity

29. WAFFLE: Watermarking in Federated Learning

31. Extraction of Complex DNN Models: Real Threat or Boogeyman?

32. Protecting the stack with PACed canaries

33. Making targeted black-box evasion attacks effective and efficient

34. DAWN: Dynamic Adversarial Watermarking of Neural Networks

35. Effective writing style imitation via combinatorial paraphrasing

36. Making Speculative BFT Resilient with Trusted Monotonic Counters

37. PACStack: an Authenticated Call Stack

38. Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?

39. Exploitation Techniques and Defenses for Data-Oriented Attacks

40. PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

41. S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX

42. All You Need is 'Love': Evading Hate-speech Detection

43. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

44. Stay On-Topic: Generating Context-specific Fake Restaurant Reviews

45. PRADA: Protecting against DNN Model Stealing Attacks

46. Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

47. D\'IoT: A Federated Self-learning Anomaly Detection System for IoT

48. Migrating SGX Enclaves with Persistent State

49. DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification

50. Towards Linux Kernel Memory Safety

Catalog

Books, media, physical & digital resources