Suivre
Somesh Jha
Somesh Jha
Lubar Chair of Computer Science, University of Wisconsin
Adresse e-mail validée de cs.wisc.edu
Titre
Citée par
Citée par
Année
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
38902016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
32412017
Distillation as a defense to adversarial perturbations against deep neural networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE symposium on security and privacy (SP), 582-597, 2016
30392016
Counterexample-guided abstraction refinement
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Computer Aided Verification: 12th International Conference, CAV 2000 …, 2000
25252000
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
22482015
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
18422002
Counterexample-guided abstraction refinement for symbolic model checking
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Journal of the ACM (JACM) 50 (5), 752-794, 2003
12252003
Semantics-aware malware detection
M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant
2005 IEEE symposium on security and privacy (S&P'05), 32-46, 2005
11122005
Static analysis of executables to detect malicious patterns
M Christodorescu, S Jha
12th USENIX Security Symposium (USENIX Security 03), 2003
10172003
Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
23rd {USENIX} Security Symposium ({USENIX} Security 14), 17-32, 2014
8272014
Two formal analyses of attack graphs
S Jha, O Sheyner, J Wing
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 49-63, 2002
7762002
Exploiting symmetry in temporal logic model checking
EM Clarke, T Filkorn, S Jha
Computer Aided Verification: 5th International Conference, CAV'93 Elounda …, 1993
7001993
Privacy risk in machine learning: Analyzing the connection to overfitting
S Yeom, I Giacomelli, M Fredrikson, S Jha
2018 IEEE 31st computer security foundations symposium (CSF), 268-282, 2018
6992018
Modular verification of software components in C
S Chaki, EM Clarke, A Groce, S Jha, H Veith
IEEE Transactions on Software Engineering 30 (6), 388-402, 2004
6822004
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
6132007
Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis
D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon
Effective Inter-Component Communication Mapping in Android with Epicc: An …, 2013
5542013
Testing malware detectors
M Christodorescu, S Jha
ACM SIGSOFT Software Engineering Notes 29 (4), 34-44, 2004
4732004
Practical black-box attacks against deep learning systems using adversarial examples
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
arXiv preprint arXiv:1602.02697 1 (2), 3, 2016
4722016
Verification of the Futurebus+ cache coherence protocol
EM Clarke, O Grumberg, H Hiraishi, S Jha, DE Long, KL McMillan, ...
Computer Hardware Description Languages and Their Applications, 15-30, 1993
4391993
Locally differentially private protocols for frequency estimation
T Wang, J Blocki, N Li, S Jha
26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017
4252017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20