Pufferfish privacy mechanisms for correlated data S Song, Y Wang, K Chaudhuri Proceedings of the 2017 ACM International Conference on Management of Data …, 2017 | 179 | 2017 |
Analyzing the robustness of nearest neighbors to adversarial examples Y Wang, S Jha, K Chaudhuri International Conference on Machine Learning, 5133-5142, 2018 | 169 | 2018 |
Data poisoning attacks against online learning Y Wang, K Chaudhuri arXiv preprint arXiv:1808.08994, 2018 | 100 | 2018 |
Adversarial example detection using latent neighborhood graph A Abusnaina, Y Wu, S Arora, Y Wang, F Wang, H Yang, D Mohaisen Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021 | 65 | 2021 |
Robustness for non-parametric classification: A generic attack and defense YY Yang, C Rashtchian, Y Wang, K Chaudhuri International Conference on Artificial Intelligence and Statistics, 941-951, 2020 | 51 | 2020 |
An Investigation of Data Poisoning Defenses for Online Learning Y Wang, S Jha, K Chaudhuri arXiv preprint arXiv:1905.12121, 2019 | 8 | 2019 |
Robust Learning against Relational Adversaries Y Wang, M Alhanahnah, X Meng, K Wang, M Christodorescu, S Jha Advances in Neural Information Processing Systems 2022, 2022 | 7 | 2022 |
Burning the Adversarial Bridges: Robust Windows Malware Detection Against Binary-level Mutations A Abusnaina, Y Wang, S Arora, K Wang, M Christodorescu, D Mohaisen arXiv preprint arXiv:2310.03285, 2023 | 4 | 2023 |
Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation S Arora, A Beams, P Chatzigiannis, S Meiser, K Patel, S Raghuraman, ... arXiv preprint arXiv:2310.04546, 2023 | 3 | 2023 |