Search

Your search keyword '"Asokan, N"' showing total 826 results

Search Constraints

Start Over You searched for: Author "Asokan, N" Remove constraint Author: "Asokan, N"
826 results on '"Asokan, N"'

Search Results

1. Combining Machine Learning Defenses without Conflicts

2. Laminator: Verifiable ML Property Cards using Hardware-assisted Attestations

3. BliMe Linter

4. Cancellable Memory Requests: A transparent, lightweight Spectre mitigation

5. Espresso: Robust Concept Filtering in Text-to-Image Models

6. SeMalloc: Semantics-Informed Memory Allocator

7. S2malloc: Statistically Secure Allocator for Use-After-Free Protection And More

8. Data-Oblivious ML Accelerators using Hardware Security Extensions

9. The Spectre of Surveillance and Censorship in Future Internet Architectures

11. SoK: Unintended Interactions among Machine Learning Defenses and Risks

12. Attesting Distributional Properties of Training Data for Machine Learning

13. A User-centered Security Evaluation of Copilot

14. FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks

15. Parallel and Asynchronous Smart Contract Execution

16. GrOVe: Ownership Verification of Graph Neural Networks using Embeddings

17. False Claims against Model Ownership Resolution

18. Attesting Distributional Properties of Training Data for Machine Learning

19. On the Robustness of Dataset Inference

20. Towards cryptographically-authenticated in-memory data structures

21. Conflicting Interactions Among Protection Mechanisms for Machine Learning Models

22. BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking

23. Is GitHub's Copilot as Bad as Humans at Introducing Vulnerabilities in Code?

24. Color My World: Deterministic Tagging for Memory Safety

25. On the Effectiveness of Dataset Watermarking in Adversarial Settings

26. Do Transformers know symbolic rules, and would we know if they did?

28. SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning

29. Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses

30. Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Models

31. A little goes a long way: Improving toxic language classification despite data scarcity

32. WAFFLE: Watermarking in Federated Learning

34. Extraction of Complex DNN Models: Real Threat or Boogeyman?

35. Protecting the stack with PACed canaries

36. Making targeted black-box evasion attacks effective and efficient

37. DAWN: Dynamic Adversarial Watermarking of Neural Networks

38. Effective writing style imitation via combinatorial paraphrasing

39. Making Speculative BFT Resilient with Trusted Monotonic Counters

40. PACStack: an Authenticated Call Stack

41. Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?

42. Exploitation Techniques and Defenses for Data-Oriented Attacks

43. Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses

44. PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

45. S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX

46. All You Need is 'Love': Evading Hate-speech Detection

47. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

48. Stay On-Topic: Generating Context-specific Fake Restaurant Reviews

49. PRADA: Protecting against DNN Model Stealing Attacks

50. Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials

Catalog

Books, media, physical & digital resources