Segui
Somesh Jha
Somesh Jha
Lubar Chair of Computer Science, University of Wisconsin
Email verificata su cs.wisc.edu
Titolo
Citata da
Citata da
Anno
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
50512016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
43002017
Distillation as a defense to adversarial perturbations against deep neural networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE symposium on security and privacy (SP), 582-597, 2016
38722016
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
33732015
Counterexample-guided abstraction refinement
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Computer Aided Verification: 12th International Conference, CAV 2000 …, 2000
26962000
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
19622002
Counterexample-guided abstraction refinement for symbolic model checking
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Journal of the ACM (JACM) 50 (5), 752-794, 2003
13372003
Privacy risk in machine learning: Analyzing the connection to overfitting
S Yeom, I Giacomelli, M Fredrikson, S Jha
2018 IEEE 31st computer security foundations symposium (CSF), 268-282, 2018
12522018
Semantics-aware malware detection
M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant
2005 IEEE symposium on security and privacy (S&P'05), 32-46, 2005
11752005
Privacy in pharmacogenetics: An {End-to-End} case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
23rd USENIX security symposium (USENIX Security 14), 17-32, 2014
11052014
Static analysis of executables to detect malicious patterns
M Christodorescu, S Jha
12th USENIX Security Symposium (USENIX Security 03), 2003
10702003
Two formal analyses of attack graphs
S Jha, O Sheyner, J Wing
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 49-63, 2002
8632002
Exploiting symmetry in temporal logic model checking
EM Clarke, R Enders, T Filkorn, S Jha
Formal methods in system design 9, 77-104, 1996
7181996
Modular verification of software components in C
S Chaki, EM Clarke, A Groce, S Jha, H Veith
IEEE Transactions on Software Engineering 30 (6), 388-402, 2004
6842004
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
6512007
Locally differentially private protocols for frequency estimation
T Wang, J Blocki, N Li, S Jha
26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017
6282017
Effective {Inter-Component} communication mapping in android: An essential step towards holistic security analysis
D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon
22nd USENIX Security Symposium (USENIX Security 13), 543-558, 2013
5782013
Practical black-box attacks against deep learning systems using adversarial examples
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
arXiv preprint arXiv:1602.02697 1 (2), 3, 2016
5132016
Testing malware detectors
M Christodorescu, S Jha
ACM SIGSOFT Software Engineering Notes 29 (4), 34-44, 2004
4912004
Verification of the Futurebus+ cache coherence protocol
EM Clarke, O Grumberg, H Hiraishi, S Jha, DE Long, KL McMillan, ...
Computer Hardware Description Languages and Their Applications, 15-30, 1993
4471993
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20