Artikel dengan mandat akses publik - Cristina Nita-RotaruPelajari lebih lanjut
Tersedia di suatu tempat: 29
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE symposium on security and privacy (SP), 19-35, 2018
Mandat: US National Science Foundation, US Department of Defense, European Commission
Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks
A Demontis, M Melis, M Pintor, M Jagielski, B Biggio, A Oprea, ...
28th USENIX security symposium (USENIX security 19), 321-338, 2019
Mandat: US Department of Defense, European Commission
Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols
AM Kakhki, S Jero, D Choffnes, C Nita-Rotaru, A Mislove
proceedings of the 2017 internet measurement conference, 290-303, 2017
Mandat: US National Science Foundation
Identifier binding attacks and defenses in {Software-Defined} networks
S Jero, W Koch, R Skowyra, H Okhravi, C Nita-Rotaru, D Bigelow
26th USENIX Security Symposium (USENIX Security 17), 415-432, 2017
Mandat: US National Science Foundation, US Department of Defense
Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations
SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li
2017 IEEE symposium on security and privacy (SP), 503-520, 2017
Mandat: US National Science Foundation
Under the hood of the ethereum gossip protocol
L Kiffer, A Salman, D Levin, A Mislove, C Nita-Rotaru
Financial Cryptography and Data Security: 25th International Conference, FC …, 2021
Mandat: US National Science Foundation
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Mandat: US National Science Foundation, US Department of Defense
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
S Jero, ME Hoque, DR Choffnes, A Mislove, C Nita-Rotaru
NDSS, 2018
Mandat: US National Science Foundation
Beads: Automated attack discovery in openflow-based sdn systems
S Jero, X Bu, C Nita-Rotaru, H Okhravi, R Skowyra, S Fahmy
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
Mandat: US National Science Foundation, US Department of Defense
Automated attack synthesis by extracting finite state machines from protocol specification documents
ML Pacheco, M von Hippel, B Weintraub, D Goldwasser, C Nita-Rotaru
2022 IEEE Symposium on Security and Privacy (SP), 51-68, 2022
Mandat: US National Science Foundation
Analyzing operational behavior of stateful protocol implementations for detecting semantic bugs
E Hoque, O Chowdhury, SY Chau, C Nita-Rotaru, N Li
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
Mandat: US National Science Foundation
Secure communication channel establishment: TLS 1.3 (over TCP fast open) vs. QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
Mandat: US National Science Foundation
Network-level adversaries in federated learning
G Severi, M Jagielski, G Yar, Y Wang, A Oprea, C Nita-Rotaru
2022 IEEE Conference on Communications and Network Security (CNS), 19-27, 2022
Mandat: US Department of Defense
Network and system level security in connected vehicle applications
H Liang, M Jagielski, B Zheng, CW Lin, E Kang, S Shiraishi, C Nita-Rotaru, ...
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-7, 2018
Mandat: US National Science Foundation
Automated attacker synthesis for distributed protocols
M von Hippel, C Vick, S Tripakis, C Nita-Rotaru
Computer Safety, Reliability, and Security: 39th International Conference …, 2020
Mandat: US National Science Foundation
Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
Journal of Cryptology 34 (3), 26, 2021
Mandat: US National Science Foundation
Backdoor attacks in peer-to-peer federated learning
G Syros, G Yar, S Boboila, C Nita-Rotaru, A Oprea
arXiv preprint arXiv:2301.09732, 2023
Mandat: US Department of Defense
Removing the reliance on perimeters for security using network views
I Anjum, D Kostecki, E Leba, J Sokal, R Bharambe, W Enck, C Nita-Rotaru, ...
Proceedings of the 27th ACM on Symposium on Access Control Models and …, 2022
Mandat: US Department of Defense
Security of electrostatic field persistent routing: Attacks and defense mechanisms
OC Ghica, C Nita-Rotaru, G Trajcevski, P Scheuermann
Ad Hoc Networks 36, 270-295, 2016
Mandat: US National Science Foundation
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
L Rashidi, D Kostecki, A James, A Peterson, M Ghaderi, S Jero, ...
NDSS, 2021
Mandat: US Department of Defense, Natural Sciences and Engineering Research Council …
Informasi terbitan dan pendanaan ditentukan secara otomatis oleh program komputer