Suivre
Prateek Mittal
Prateek Mittal
Adresse e-mail validée de princeton.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Advances and open problems in federated learning
P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ...
Foundations and trends® in machine learning 14 (1–2), 1-210, 2021
61122021
Analyzing federated learning through an adversarial lens
AN Bhagoji, S Chakraborty, P Mittal, S Calo
International conference on machine learning, 634-643, 2019
12482019
Robustbench: a standardized adversarial robustness benchmark
F Croce, M Andriushchenko, V Sehwag, E Debenedetti, N Flammarion, ...
arXiv preprint arXiv:2010.09670, 2020
6852020
Sybilinfer: Detecting sybil nodes using social networks.
G Danezis, P Mittal
Ndss 9, 1-15, 2009
6232009
EASiER: Encryption-based access control in social networks with efficient revocation
S Jahid, P Mittal, N Borisov
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
5932011
Rocking drones with intentional sound noise on gyroscopic sensors
Y Son, H Shin, D Kim, Y Park, J Noh, K Choi, J Choi, Y Kim
24th USENIX Security Symposium (USENIX Security 15), 881-896, 2015
4632015
Rocking drones with intentional sound noise on gyroscopic sensors
Y Son, H Shin, D Kim, Y Park, J Noh, K Choi, J Choi, Y Kim
24th USENIX Security Symposium (USENIX Security 15), 881-896, 2015
4632015
{BlackIoT}:{IoT} botnet of high wattage devices can disrupt the power grid
S Soltan, P Mittal, HV Poor
27th USENIX Security Symposium (USENIX Security 18), 15-32, 2018
4112018
Systematic evaluation of privacy risks of machine learning models
L Song, P Mittal
30th USENIX Security Symposium (USENIX Security 21), 2615-2632, 2021
3522021
{BotGrep}: Finding {P2P} Bots with Structured Graph Analysis
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
19th USENIX Security Symposium (USENIX Security 10), 2010
3522010
Ssd: A unified framework for self-supervised outlier detection
V Sehwag, M Chiang, P Mittal
arXiv preprint arXiv:2103.12051, 2021
3232021
Darts: Deceiving autonomous cars with toxic signs
C Sitawarin, AN Bhagoji, A Mosenia, M Chiang, P Mittal
arXiv preprint arXiv:1802.06430, 2018
2992018
{RAPTOR}: Routing attacks on privacy in tor
Y Sun, A Edmundson, L Vanbever, O Li, J Rexford, M Chiang, P Mittal
24th USENIX Security Symposium (USENIX Security 15), 271-286, 2015
2882015
Falcon: Honest-majority maliciously secure framework for private deep learning
S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin
arXiv preprint arXiv:2004.02229, 2020
2832020
Evolution of social-attribute networks: measurements, modeling, and implications using google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
Proceedings of the 2012 internet measurement conference, 131-144, 2012
2712012
Dependence makes you vulnberable: Differential privacy under dependent tuples.
C Liu, S Chakraborty, P Mittal
NDSS 16, 21-24, 2016
2692016
Privacy risks of securing machine learning models against adversarial examples
L Song, R Shokri, P Mittal
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
2682019
Fine-tuning aligned language models compromises safety, even when users do not intend to!
X Qi, Y Zeng, T Xie, PY Chen, R Jia, P Mittal, P Henderson
arXiv preprint arXiv:2310.03693, 2023
2572023
Denial of service or denial of security?
N Borisov, G Danezis, P Mittal, P Tabriz
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2542007
Enhancing robustness of machine learning systems via data transformations
AN Bhagoji, D Cullina, C Sitawarin, P Mittal
2018 52nd Annual Conference on Information Sciences and Systems (CISS), 1-5, 2018
2502018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20