Somesh Jha
#116,331
Most Influential Person Now
Somesh Jha's AcademicInfluence.com Rankings
Somesh Jhacriminal-justice Degrees
Criminal Justice
#133
World Rank
#151
Historical Rank
Cyber Security
#11
World Rank
#11
Historical Rank
Somesh Jhacomputer-science Degrees
Computer Science
#4550
World Rank
#4800
Historical Rank
Cybersecurity
#11
World Rank
#11
Historical Rank
Machine Learning
#930
World Rank
#943
Historical Rank
Artificial Intelligence
#1150
World Rank
#1170
Historical Rank
Download Badge
Criminal Justice Computer Science
Somesh Jha's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Somesh Jha Influential?
(Suggest an Edit or Addition)Somesh Jha's Published Works
Published Works
- The Limitations of Deep Learning in Adversarial Settings (2015) (3097)
- Practical Black-Box Attacks against Machine Learning (2016) (2786)
- Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks (2015) (2490)
- Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures (2015) (1778)
- Automated generation and analysis of attack graphs (2002) (1347)
- Counterexample-guided abstraction refinement for symbolic model checking (2003) (1006)
- Semantics-aware malware detection (2005) (786)
- Static Analysis of Executables to Detect Malicious Patterns (2003) (714)
- Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing (2014) (625)
- Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting (2017) (578)
- Exploiting symmetry in temporal logic model checking (1993) (561)
- Two formal analyses of attack graphs (2002) (512)
- Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples (2016) (453)
- Modular verification of software components in C (2004) (388)
- Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis (2013) (354)
- Testing malware detectors (2004) (343)
- Locally Differentially Private Protocols for Frequency Estimation (2017) (337)
- Global Intrusion Detection in the DOMINO Overlay System (2004) (333)
- Towards automatic generation of vulnerability-based signatures (2006) (317)
- Verification of the Futurebus+ cache coherence protocol (1993) (315)
- Weighted pushdown systems and their application to interprocedural dataflow analysis (2003) (274)
- Mining specifications of malicious behavior (2008) (270)
- Deflating the big bang: fast and scalable deep packet inspection with extended finite automata (2008) (265)
- OmniUnpack: Fast, Generic, and Safe Unpacking of Malware (2007) (245)
- Progress on the State Explosion Problem in Model Checking (2001) (238)
- Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors (2010) (234)
- Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (2015) (209)
- Privacy Preserving Clustering (2005) (208)
- Towards Practical Privacy for Genomic Computation (2008) (208)
- Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics (2016) (190)
- Efficient Context-Sensitive Intrusion Detection (2004) (189)
- XFA: Faster Signature Matching with Extended Automata (2008) (186)
- A semantics-based approach to malware detection (2007) (185)
- Formalizing sensitivity in static analysis for intrusion detection (2004) (184)
- Modular verification of software components in C (2003) (183)
- Efficient filtering in publish-subscribe systems using binary decision diagrams (2001) (181)
- Mining specifications of malicious behavior (2007) (180)
- Model Checking for Security Protocols (1997) (177)
- FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution (2013) (176)
- An architecture for generating semantics-aware signatures (2005) (176)
- Software Design as an Investment Activity: A Real Options Perspective (1998) (174)
- An Improved Algorithm for the Evaluation of Fixpoint Expressions (1994) (168)
- Detecting Manipulated Remote Call Streams (2002) (160)
- Verifying security protocols with Brutus (2000) (160)
- Tree-like counterexamples in model checking (2002) (155)
- Privacy at Scale: Local Differential Privacy in Practice (2018) (151)
- A Layered Architecture for Detecting Malicious Behaviors (2008) (147)
- Cyber SA: Situational Awareness for Cyber Defense (2010) (138)
- Analyzing the Robustness of Nearest Neighbors to Adversarial Examples (2017) (136)
- Multi-Agent Coordination through Coalition Formation (1997) (135)
- Markov chains, classifiers, and intrusion detection (2001) (132)
- Using state space exploration and a natural deduction style message derivation engine to verify security protocols (1998) (131)
- Symmetry Reductions in Model Checking (1998) (131)
- Veryfying Parameterized Networks using Abstraction and Regular Languages (1995) (130)
- Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis (2013) (130)
- Towards Formal Verification of Role-Based Access Control Policies (2008) (129)
- The design and implementation of microdrivers (2008) (129)
- Retargeting Android applications to Java bytecode (2012) (126)
- Security challenges in automotive hardware/software architecture design (2013) (122)
- A Methodology for Formalizing Model-Inversion Attacks (2016) (119)
- Buffer overrun detection using linear programming and static analysis (2003) (117)
- Locally Differentially Private Frequent Itemset Mining (2018) (114)
- Agent cloning: an approach to agent mobility and resource allocation (1998) (107)
- Minimization and Reliability Analyses of Attack Graphs (2002) (106)
- Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis (2016) (104)
- Backtracking Algorithmic Complexity Attacks against a NIDS (2006) (99)
- A semantics-based approach to malware detection (2008) (97)
- Automatic generation and analysis of NIDS attacks (2004) (91)
- Creating Vulnerability Signatures Using Weakest Preconditions (2007) (89)
- Complexity of uniqueness and local search in quadratic 0-1 programming (1992) (88)
- Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning (2017) (87)
- Combining Partial Order and Symmetry Reductions (1997) (83)
- Exploring Connections Between Active Learning and Model Extraction (2018) (82)
- Verifying parameterized networks (1997) (82)
- Static analysis and compiler design for idempotent processing (2012) (79)
- A model checker for authentication protocols (1997) (78)
- Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption (2018) (77)
- Semantic Adversarial Deep Learning (2018) (76)
- Malware Normalization (2005) (76)
- Reasoning about implicit invocation (1998) (70)
- Environment-Sensitive Intrusion Detection (2005) (69)
- Automatic placement of authorization hooks in the linux security modules framework (2005) (68)
- Survivability analysis of network specifications (2000) (67)
- Locally Differentially Private Heavy Hitter Identification (2017) (67)
- Retrofitting legacy code for authorization policy enforcement (2006) (66)
- MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation (2018) (65)
- Automated Discovery of Mimicry Attacks (2006) (65)
- Malware Detection (2010) (63)
- Secure function evaluation with ordered binary decision diagrams (2006) (62)
- Malware Detection (Advances in Information Security) (2006) (59)
- Answering Multi-Dimensional Analytical Queries under Local Differential Privacy (2019) (58)
- Cimplifier: automatically debloating containers (2017) (57)
- Proceedings of the 15th ACM conference on Computer and communications security (2008) (54)
- Randomized Stopping Times and American Option Pricing with Transaction Costs (2001) (53)
- ATOM: Robustifying Out-of-Distribution Detection Using Outlier Mining (2020) (52)
- Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (2007) (51)
- Cryptϵ: Crypto-Assisted Differential Privacy on Untrusted Servers (2020) (51)
- Robust Out-of-distribution Detection in Neural Networks (2020) (50)
- Practical DIFC Enforcement on Android (2016) (50)
- Robust Attribution Regularization (2019) (49)
- On generalized authorization problems (2003) (47)
- Concise Explanations of Neural Networks using Adversarial Training (2018) (44)
- Semantic Robustness of Models of Source Code (2020) (44)
- Analysis of SPKI/SDSI certificates using model checking (2002) (43)
- Language-based generation and evaluation of NIDS signatures (2005) (42)
- NetSpy: Automatic Generation of Spyware Signatures for NIDS (2006) (41)
- Partial Order Reductions for Security Protocol Verification (2000) (41)
- A Formal Treatment of Distributed Matchmaking. (1998) (40)
- A Refined Binomial Lattice for Pricing American Asian Options (1999) (39)
- Attribution-Based Confidence Metric For Deep Neural Networks (2019) (38)
- Software transformations to improve malware detection (2007) (38)
- Kernel-Supported Cost-Effective Audit Logging for Causality Tracking (2018) (38)
- Security policy reconciliation in distributed computing environments (2004) (38)
- Model checking SPKI/SDSI (2004) (37)
- Symmetry and Induction in Model Checking (1995) (36)
- Multi-byte Regular Expression Matching with Speculation (2009) (36)
- Isomorph-free model enumeration: a new method for checking relational specifications (1998) (36)
- An Attack on InstaHide: Is Private Learning Possible with Instance Encoding? (2020) (35)
- End-to-End Software Diversification of Internet Services (2011) (35)
- Automatic discovery of API-level exploits (2005) (35)
- Microdrivers: A New Architecture for Device Drivers (2007) (35)
- An Architecture for Generating Semantic Aware Signatures (2005) (34)
- A logic of file systems (2005) (34)
- Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures (2008) (33)
- Secure computations on non-integer values (2010) (33)
- The Potential of Portfolio Analysis in Guiding Software Decisions (1999) (32)
- Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection (2014) (32)
- Automatic Generation of Remediation Procedures for Malware Infections (2010) (32)
- DIFC programs by automatic instrumentation (2010) (32)
- Software Design Decisions As Real Options (1997) (31)
- Speculative Parallel Pattern Matching (2011) (31)
- Nonlinear quantification scheduling in image computation (2001) (30)
- OAT: Attesting Operation Integrity of Embedded Devices (2018) (30)
- Fusion and Filtering in Distributed Intrusion Detection Systems (2004) (30)
- Towards Effective Differential Privacy Communication for Users’ Data Sharing Decision and Comprehension (2020) (30)
- The Unintended Consequences of Overfitting: Training Data Inference Attacks (2017) (30)
- Privacy-Preserving Ridge Regression on Distributed Data (2017) (29)
- Security and Privacy in Communication Networks (2017) (28)
- Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences (2015) (28)
- Smart Contracts and Opportunities for Formal Methods (2018) (27)
- Satisfiability modulo counting: a new approach for analyzing privacy properties (2014) (26)
- CaPC Learning: Confidential and Private Collaborative Learning (2021) (26)
- CrowdMine: Towards crowdsourced human-assisted verification (2012) (25)
- Face-Off: Adversarial Face Obfuscation (2020) (25)
- LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes (2014) (25)
- Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning (2020) (24)
- Using Combinatorial Optimization Methods for Quantification Scheduling (2001) (24)
- Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training Ensembles (2021) (24)
- Composite Constant Propagation and its Application to Android Program Analysis (2016) (23)
- Graph separation techniques for quadratic zero-one programming (1991) (23)
- Increasing Resource Utilization and Task Performance by Agent Cloning (1998) (23)
- CAUSE: Learning Granger Causality from Event Sequences using Attribution Methods (2020) (23)
- Is Private Learning Possible with Instance Encoding? (2021) (22)
- Differentially Private Stochastic Gradient Descent for in-RDBMS Analytics (2016) (22)
- Towards a Formal Treatment of Implicit Invocation (1997) (22)
- Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (2012) (22)
- Protomatching network traffic for high throughputnetwork intrusion detection (2006) (21)
- Faster checking of software specifications by eliminating isomorphs (1996) (21)
- A Machine Checkable Logic of Knowledge forSpecifying Security Properties of ElectronicCommerce Protocols (1998) (21)
- Towards Secure Bioinformatics Services (Short Paper) (2011) (21)
- Accurate approximations for European-style Asian options (1998) (21)
- Effective blame for information-flow violations (2008) (21)
- Detecting Adversarial Examples Using Data Manifolds (2018) (21)
- Abstract BDDs: A Technique for Using Abstraction in Model Checking (1999) (20)
- Fast Signature Matching Using Extended Finite Automaton (XFA) (2008) (20)
- Efficient Type Matching (2002) (20)
- Equivalence checking using abstract BDDs (1997) (19)
- Adversarially Robust Learning Could Leverage Computational Hardness (2019) (19)
- Malware Lineage in the Wild (2017) (19)
- Synthesizing near-optimal malware specifications from suspicious behaviors (2013) (19)
- Model Extraction and Active Learning (2018) (19)
- Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks (2018) (19)
- Approximate Option Pricing (1996) (19)
- A General Framework For Detecting Anomalous Inputs to DNN Classifiers (2020) (18)
- Informative Outlier Matters: Robustifying Out-of-distribution Detection Using Outlier Mining (2020) (18)
- Neural-augmented static analysis of Android communication (2018) (18)
- Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems (2017) (18)
- Secure Programming via Visibly Pushdown Safety Games (2012) (18)
- Continuous Release of Data Streams under both Centralized and Local Differential Privacy (2020) (18)
- Improving utility and security of the shuffler-based differential privacy (2019) (17)
- Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning (1998) (17)
- Verifying Information Flow Control over Unbounded Processes (2009) (17)
- A formal treatment of distributed matchmaking (poster) (1998) (17)
- Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training (2017) (17)
- Automating Security Mediation Placement (2010) (17)
- Declarative, Temporal, and Practical Programming with Capabilities (2013) (17)
- Efficient verification of security protocols using partial-order reductions (2003) (15)
- Behavior-based malware detection (2007) (15)
- Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments (2005) (14)
- Botnet protocol inference in the presence of encrypted traffic (2017) (14)
- Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms (2011) (14)
- Privacy-Preserving Collaborative Prediction using Random Forests (2018) (14)
- TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection (2021) (14)
- Accurate Approximations for European Asian Options (1999) (14)
- New Directions for Container Debloating (2017) (14)
- Attacks and Defenses (2021) (14)
- Adversarial Learning and Explainability in Structured Datasets. (2018) (14)
- Weighted Pushdown Systems and Trust-Management Systems (2006) (13)
- Secure computations on non-integer values with applications to privacy-preserving sequence analysis (2013) (13)
- Towards Secure Bioinformatics Services (2010) (13)
- Improving Adversarial Robustness by Data-Specific Discretization (2018) (13)
- Query restart strategies for Web agents (1998) (12)
- Practical and Robust Privacy Amplification with Multi-Party Differential Privacy (2019) (11)
- Checking relational specifications with binary decision diagrams (1996) (11)
- Model Checking for Security (1997) (10)
- EIFFeL: Ensuring Integrity for Federated Learning (2021) (10)
- Counterexample-Guide dAbstractio nRefinemen t ? (2000) (10)
- Steven Shreve: Stochastic Calculus and Finance (1997) (10)
- Generating Semantic Adversarial Examples with Differentiable Rendering (2019) (10)
- Data-Dependent Differentially Private Parameter Learning for Directed Graphical Models (2019) (10)
- Agent cloning (1998) (10)
- Design and implementation of the PLUG architecture for programmable and efficient network lookups (2010) (9)
- Attribution-driven Causal Analysis for Detection of Adversarial Examples (2019) (9)
- Optimal Membership Inference Bounds for Adaptive Composition of Sampled Gaussian Mechanisms (2022) (9)
- OEI: Operation Execution Integrity for Embedded Devices (2018) (9)
- Model-based intrusion detection system design and evaluation (2006) (9)
- Deep packet inspection with DFA-trees and parametrized language overapproximation (2014) (9)
- Interval universal approximation for neural networks (2020) (9)
- Sample Complexity of Robust Linear Classification on Separated Data (2021) (9)
- Model checking algorithms for the µ-calculus (2000) (9)
- Formatted Encryption Beyond Regular Languages (2014) (9)
- Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers (2020) (9)
- NeuraCrypt is not private (2021) (8)
- A Declarative Framework for Intrusion Analysis (2010) (8)
- On the Need for Topology-Aware Generative Models for Manifold-Based Defenses (2019) (8)
- Robust Out-of-distribution Detection via Informative Outlier Mining (2020) (8)
- Protocol Normalization Using Attribute Grammars (2009) (7)
- Outis: Crypto-Assisted Differential Privacy on Untrusted Servers (2019) (7)
- Toward Formal Verification of Role-Based Access Control Policies (2008) (7)
- When Good Models Meet Bad Data: Applying Quantitative Economic Models to Qualitative Engineering Judgments (2000) (7)
- Adversarial Binaries for Authorship Identification (2018) (7)
- Analysis Techniques for Information Security (2010) (7)
- Secure Computations on Real-Valued Signals (2010) (7)
- Reducing the Dependence of SPKI/SDSI on PKI (2006) (7)
- Efficient runtime-enforcement techniques for policy weaving (2014) (7)
- Rearchitecting Classification Frameworks For Increased Robustness (2019) (7)
- Fairness Properties of Face Recognition and Obfuscation Systems (2021) (7)
- Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification (2020) (7)
- A Collection of Use Cases for a Simple API for Grid Applications (2006) (7)
- The Options Approach to Software Prototyping Decisions. (1997) (7)
- ShadowNet: A Secure and Efficient System for On-device Model Inference (2020) (6)
- Manifold Assumption and Defenses Against Adversarial Perturbations (2018) (6)
- Towards Evaluating the Robustness of Neural Networks Learned by Transduction (2021) (6)
- Automatic Discovery of API-Level Vulnerabilities (2008) (6)
- Program synthesis for interactive-security systems (2017) (6)
- Secure Programming as a Parity Game (2011) (5)
- Representation Bayesian Risk Decompositions and Multi-Source Domain Adaptation (2020) (5)
- Recent Advances in Intrusion Detection, 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings (2010) (5)
- Analyzing Accuracy Loss in Randomized Smoothing Defenses (2020) (5)
- Adversarial Forces of Physical Models (2020) (5)
- Crypt$\epsilon$: Crypto-Assisted Differential Privacy on Untrusted Servers. (2019) (4)
- Strategies for Querying Information Agents (1998) (4)
- Exploring Adversarial Robustness of Deep Metric Learning (2021) (4)
- Towards Discovering and Containing Privacy Violations in Software (2004) (4)
- Policy by Example: An Approach for Security Policy Specification (2017) (4)
- Privacy Implications of Shuffling (2022) (4)
- Recent advances in intrusion detection : 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings (2009) (4)
- Explainable Black-Box Attacks Against Model-based Authentication (2018) (4)
- Towards Automated Authorization Policy Enforcement (2006) (4)
- Towards Least Privilege Containers with Cimplifier (2016) (4)
- CCS '08 : proceedings of the 15th ACM Conference on Computer and Communications Security : Alexandria, Virginia, USA, October 27-31, 2008 (2008) (3)
- Abstract Universal Approximation for Neural Networks (2020) (3)
- Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings (2007) (3)
- GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems (2020) (3)
- Optimizing Locally Differentially Private Protocols (2017) (3)
- Semantic integrity in large-scale online simulations (2010) (3)
- Towards Adversarial Robustness via Transductive Learning (2021) (3)
- Lightweight, Multi-Stage, Compiler-Assisted Application Specialization (2021) (3)
- Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision (2022) (3)
- Distributed Certificate-Chain Discovery in SPKI/SDSI (2005) (3)
- On the completeness of attack mutation algorithms (2006) (2)
- An Iterative Framework for Simulation Conformance (2005) (2)
- Concept-based Explanations for Out-Of-Distribution Detectors (2022) (2)
- Formal Analysis of Branch Prediction Algorithms (1998) (2)
- Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009 (2009) (2)
- A Shuffling Framework for Local Differential Privacy (2021) (2)
- Effect of Facts Box on Users’ Comprehension of Differential Privacy: A Preliminary Study (2020) (2)
- Security Analysis and Administrative Insider Threat Assessment in Role-Based Access Control (2005) (2)
- Privacy-Preserving Ridge Regression over Distributed Data from LHE ∗ (2017) (2)
- Integrating Publish/Subscribe into a Mobile Teamwork Support Platform (2003) (2)
- A Quantitative Geometric Approach to Neural Network Smoothness (2022) (2)
- Obliviousness Makes Poisoning Adversaries Weaker (2020) (2)
- On Effective Model-Based Intrusion Detection (2005) (2)
- Robust Physical Hard-Label Attacks on Deep Learning Visual Classification (2020) (2)
- Modelling and control of cell reaction networks (2001) (2)
- Software Security Issues in Embedded Systems (2007) (2)
- Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (2008) (2)
- Proceedings of the 13th international conference on Recent advances in intrusion detection (2010) (2)
- Programming for a Capability System via Safety Games (2011) (2)
- Robust Learning against Relational Adversaries (2022) (2)
- Sample Complexity of Adversarially Robust Linear Classification on Separated Data (2020) (2)
- A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks (2020) (2)
- ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks (2020) (1)
- Overparameterized (robust) models from computational constraints (2022) (1)
- Model Checking Basics (1)
- Causally Constrained Data Synthesis for Private Data Release (2021) (1)
- Guest Editorial: Special Issue on Computer and Communications Security (2012) (1)
- Attack Generation for NIDS Testing Using Natural Deduction (2004) (1)
- Compiler Construction of Idempotent Regions (2011) (1)
- Intertwining Order Preserving Encryption and Differential Privacy (2020) (1)
- The Trade-off between Universality and Label Efficiency of Representations from Contrastive Learning (2023) (1)
- Secure programs via game-based synthesis (2013) (1)
- Towards Adversarially Robust Deepfake Detection: An Ensemble Approach (2022) (1)
- Restart Strategies for Web Agents (1997) (1)
- Formal models and tools to improve nids accuracy (2006) (1)
- The Trade-off between Label Efficiency and Universality of Representations from Contrastive Learning (2022) (1)
- Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing (2022) (1)
- Validating Library Usage Interactively (2013) (1)
- On Automatic Placement of Declassifiers for Information-Flow Security (2008) (1)
- Scaling the Academic Security Community (2019) (1)
- EIFFeL (2022) (1)
- Kali: Scalable encryption fingerprinting in dynamic malware traces (2017) (1)
- Program Binary Typical workloads Input Spec . Causality Inference Engine Model Constructor Causal Models Segmented Parser Context Constraint Checker Audit Logs Causality Annotated Model Generation Model Parsing Recognized Causality Recognized Models (2017) (0)
- Session details: Intrusion detection and prevention (2005) (0)
- Overparameterization from Computational Constraints (2022) (0)
- Poster : Locally Differentially Private Frequent Itemset Mining (2018) (0)
- Towards Enforceable Data-Driven Privacy Policies (2011) (0)
- SERVICE DE SÉCURITÉ D'APPLICATION (2018) (0)
- On the Integrity of Deep Learning Oracles (2016) (0)
- Formal Analysis of the API Proxy Problem (2023) (0)
- Enhancing Android Security Through App Splitting (2017) (0)
- L G ] 2 6 M ay 2 01 9 Enhancing ML Robustness Using Physical-World Constraints (2019) (0)
- A ug 2 02 1 NeuraCrypt is not private (2021) (0)
- Machine Learning and Logical Reasoning: The New Frontier (Dagstuhl Seminar 22291) (2022) (0)
- Information Systems Security : 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings (2010) (0)
- Private Information Retrieval (2010) (0)
- Few-Shot Domain Adaptation For End-to-End Communication (2021) (0)
- Practical secure function evaluation (2011) (0)
- GRAPHITE: A Practical Framework for Generating Automatic Physical Adversarial Machine Learning Attacks (2021) (0)
- Concise and Stable Explanations using Adversarial Training (2018) (0)
- Message from the Program Chairs: S&P 2012 (2012) (0)
- Information Flow Integrity for Systems of Independently-Developed Components (2015) (0)
- T OWARDS E VALUATING THE R OBUSTNESS OF N EURAL N ETWORKS L EARNED BY T RANSDUCTION (2022) (0)
- Cryptϵ (2020) (0)
- Improved Rational Two-Port Model of Uniform R-C-NR Structure (1985) (0)
- Robustness against Relational Adversary (2020) (0)
- Private Multi-Winner Voting for Machine Learning (2022) (0)
- Enhancing ML Robustness Using Physical-World Constraints (2019) (0)
- Domain Adaptation for Autoencoder-Based End-to-End Communication Over Wireless Channels (2021) (0)
- Robust Learning against Logical Adversaries (2020) (0)
- Generating Semantic Adversarial Examples through Differentiable Rendering (2020) (0)
- Trustworthy Machine Learning: Past, Present, and Future (2021) (0)
- Information Systems Security (2011) (0)
- autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning (2023) (0)
- Formalizing Attack Mutation for NIDS Testing (2005) (0)
- An Exploration of Multicalibration Uniform Convergence Bounds (2022) (0)
- Federated Boosted Decision Trees with Differential Privacy (2022) (0)
- On the Power of Oblivious Poisoning Attacks (2020) (0)
- Introduction to the Special Issue on Automotive CPS Safety & Security: Part 1 (2023) (0)
- Martingales and Fuzzy Stopping Times in the Pricing of American Options with Transaction Costs (1999) (0)
- The Options Approach to Software Prototyping Decisions 1 (1997) (0)
- Program synthesis for interactive-security systems (2017) (0)
- Brittle Features of Device Authentication (2021) (0)
- Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 (2008) (0)
- Reducing the Dependence of Trust-Management Systems on PKI (2005) (0)
- ASPEST: Bridging the Gap Between Active Learning and Selective Prediction (2023) (0)
- On Need for Topology Awareness of Generative Models (2019) (0)
- Efficient Symbolic Reasoning for Neural-Network Verification (2023) (0)
- Proceedings of the 6th international conference on Information systems security (2010) (0)
- 2018 CAV award (2021) (0)
- ROSA: R Optimizations with Static Analysis (2017) (0)
- Investigating Stateful Defenses Against Black-Box Adversarial Examples (2023) (0)
- Generalized Stuttering Equivalence (1999) (0)
- Through App Splitting (2018) (0)
- Stratified Adversarial Robustness with Rejection (2023) (0)
- Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples (2021) (0)
- Retrofitting Legacy Code for Security (2010) (0)
- P RIVACY I MPLICATIONS OF S HUFFLING A BSTRACT (2022) (0)
- Strengthening Order Preserving Encryption with Differential Privacy (2020) (0)
- Robust and Accurate Authorship Attribution via Program Normalization (2020) (0)
- Holistic Cube Analysis: A Query Framework for Data Insights (2023) (0)
- Detecting and stopping privacy violations in software (2007) (0)
- Aviation , Home Ministries spar over regulating drones Tussle between aircraft safety versus security and privacy (2017) (0)
- Learning Modulo Theories (2023) (0)
- An analysis of Web Server performance with an accelerator (2001) (0)
- 2018 CAV award (2021) (0)
- Verifying Information Flow Over Unbounded Processes (2009) (0)
- Constraints from GPS on Block Kinematics of the Transition between the Southern Walker Lane and the Basin and Range Province (2008) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Somesh Jha?
Somesh Jha is affiliated with the following schools: