Volgen
Shruti Tople
Shruti Tople
Azure Research, Microsoft
Geverifieerd e-mailadres voor microsoft.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A uror: defending against poisoning attacks in collaborative deep learning systems
S Shen, S Tople, P Saxena
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
3892016
Panoply: Low-TCB Linux Applications With SGX Enclaves.
S Shinde, D Le Tien, S Tople, P Saxena
NDSS, 2017
3082017
Domain generalization using causal matching
D Mahajan, S Tople, A Sharma
International Conference on Machine Learning, 7313-7324, 2021
3032021
Falcon: Honest-majority maliciously secure framework for private deep learning
S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin
Proceedings on Privacy Enhancing Technologies 2021 (1), 188-208, 2021
2812021
A traceability analysis of monero’s blockchain
A Kumar, C Fischer, S Tople, P Saxena
European Symposium on Research in Computer Security, 153-173, 2017
2452017
Analyzing leakage of personally identifiable information in language models
N Lukas, A Salem, R Sim, S Tople, L Wutschitz, S Zanella-Béguelin
arXiv preprint arXiv:2302.00539, 2023
1362023
Analyzing information leakage of updates to natural language models
S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
1232020
Privado: Practical and secure DNN inference
S Tople, K Grover, S Shinde, R Bhagwan, R Ramjee
arXiv preprint arXiv:1810.00602, 2018
97*2018
Leakage of Dataset Properties in Multi-Party Machine Learning
W Zhang, S Tople, O Ohrimenko
30th {USENIX} Security Symposium ({USENIX} Security 21), 2687-2704, 2021
93*2021
Alleviating Privacy Attacks via Causal Learning
S Tople, A Sharma, A Nori
International Conference on Machine Learning, 9537-9547, 2020
352020
Bayesian estimation of differential privacy
S Zanella-Béguelin, L Wutschitz, S Tople, A Salem, V Rühle, A Paverd, ...
arXiv preprint arXiv:2206.05199, 2022
332022
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content
S Tople, S Shinde, Z Chen, P Saxena
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
332013
Collaborative Machine Learning Markets with Data-Replication-Robust Payments
O Ohrimenko, S Tople, S Tschiatschek
arXiv preprint arXiv:1911.09052, 2019
322019
On the trade-offs in oblivious execution techniques
S Tople, P Saxena
International Conference on Detection of Intrusions and Malware, and …, 2017
302017
SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
A Salem, G Cherubin, D Evans, B Köpf, A Paverd, A Suri, S Tople, ...
arXiv preprint arXiv:2212.10986, 2022
292022
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
272013
PRO-ORAM: Practical Read-Only Oblivious {RAM}
S Tople, Y Jia, P Saxena
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
25*2019
Grey-box Extraction of Natural Language Models
S Zanella-Beguelin, S Tople, A Paverd, B Köpf
International Conference on Machine Learning, 12278-12286, 2021
232021
Protecting machine learning models from privacy attacks
A Sharma, AV Nori, SS TOPLE
US Patent App. 16/559,444, 2021
182021
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Y Jia, T Moataz, S Tople, P Saxena
USENIX Security Symposium, 945-962, 2016
182016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20