BibTeX records: Octavian Suciu

download as .bib file

@inproceedings{DBLP:conf/uss/SuciuNLBD22,
  author       = {Octavian Suciu and
                  Connor Nelson and
                  Zhuoer Lyu and
                  Tiffany Bao and
                  Tudor Dumitras},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Expected Exploitability: Predicting the Development of Functional
                  Vulnerability Exploits},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {377--394},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/suciu},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/SuciuNLBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Suciu21,
  author       = {Octavian Suciu},
  title        = {Data-Driven Techniques For Vulnerability Assessments},
  school       = {University of Maryland, College Park, MD, {USA}},
  year         = {2021},
  url          = {https://hdl.handle.net/1903/28370},
  doi          = {10.13016/WFED-WU0H},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Suciu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-07869,
  author       = {Octavian Suciu and
                  Connor Nelson and
                  Zhuoer Lyu and
                  Tiffany Bao and
                  Tudor Dumitras},
  title        = {Expected Exploitability: Predicting the Development of Functional
                  Vulnerability Exploits},
  journal      = {CoRR},
  volume       = {abs/2102.07869},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.07869},
  eprinttype    = {arXiv},
  eprint       = {2102.07869},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-07869.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SuciuCJ19,
  author       = {Octavian Suciu and
                  Scott E. Coull and
                  Jeffrey Johns},
  title        = {Exploring Adversarial Examples in Malware Detection},
  booktitle    = {2019 {IEEE} Security and Privacy Workshops, {SP} Workshops 2019, San
                  Francisco, CA, USA, May 19-23, 2019},
  pages        = {8--14},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SPW.2019.00015},
  doi          = {10.1109/SPW.2019.00015},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SuciuCJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaifs/SuciuCJ18,
  author       = {Octavian Suciu and
                  Scott E. Coull and
                  Jeffrey Johns},
  editor       = {Joseph B. Collins and
                  Prithviraj Dasgupta and
                  Ranjeev Mittu},
  title        = {Exploring Adversarial Examples in Malware Detection},
  booktitle    = {Proceedings of the {AAAI} Symposium on Adversary-Aware Learning Techniques
                  and Trends in Cybersecurity {(ALEC} 2018) co-located with the Association
                  for the Advancement of Artificial Intelligence 2018 Fall Symposium
                  Series {(AAAI-FSS} 2018), Arlington, Virginia, USA, October 18-20,
                  2018},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2269},
  pages        = {11--16},
  publisher    = {CEUR-WS.org},
  year         = {2018},
  url          = {https://ceur-ws.org/Vol-2269/FSS-18\_paper\_44.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:39 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaifs/SuciuCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ShafahiHNSSDG18,
  author       = {Ali Shafahi and
                  W. Ronny Huang and
                  Mahyar Najibi and
                  Octavian Suciu and
                  Christoph Studer and
                  Tudor Dumitras and
                  Tom Goldstein},
  editor       = {Samy Bengio and
                  Hanna M. Wallach and
                  Hugo Larochelle and
                  Kristen Grauman and
                  Nicol{\`{o}} Cesa{-}Bianchi and
                  Roman Garnett},
  title        = {Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks},
  booktitle    = {Advances in Neural Information Processing Systems 31: Annual Conference
                  on Neural Information Processing Systems 2018, NeurIPS 2018, December
                  3-8, 2018, Montr{\'{e}}al, Canada},
  pages        = {6106--6116},
  year         = {2018},
  url          = {https://proceedings.neurips.cc/paper/2018/hash/22722a343513ed45f14905eb07621686-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/ShafahiHNSSDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/DumitrasKMS18,
  author       = {Tudor Dumitras and
                  Yigitcan Kaya and
                  Radu Marginean and
                  Octavian Suciu},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Too Big to {FAIL:} What You Need to Know Before Attacking a Machine
                  Learning System},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {150--162},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_17},
  doi          = {10.1007/978-3-030-03251-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/DumitrasKMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SuciuMKDD18,
  author       = {Octavian Suciu and
                  Radu Marginean and
                  Yigitcan Kaya and
                  Hal Daum{\'{e}} III and
                  Tudor Dumitras},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {When Does Machine Learning FAIL? Generalized Transferability for Evasion
                  and Poisoning Attacks},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1299--1316},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/suciu},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SuciuMKDD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-06975,
  author       = {Octavian Suciu and
                  Radu Marginean and
                  Yigitcan Kaya and
                  Hal Daum{\'{e}} III and
                  Tudor Dumitras},
  title        = {When Does Machine Learning FAIL? Generalized Transferability for Evasion
                  and Poisoning Attacks},
  journal      = {CoRR},
  volume       = {abs/1803.06975},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.06975},
  eprinttype    = {arXiv},
  eprint       = {1803.06975},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-06975.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-00792,
  author       = {Ali Shafahi and
                  W. Ronny Huang and
                  Mahyar Najibi and
                  Octavian Suciu and
                  Christoph Studer and
                  Tudor Dumitras and
                  Tom Goldstein},
  title        = {Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1804.00792},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.00792},
  eprinttype    = {arXiv},
  eprint       = {1804.00792},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-00792.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-08280,
  author       = {Octavian Suciu and
                  Scott E. Coull and
                  Jeffrey Johns},
  title        = {Exploring Adversarial Examples in Malware Detection},
  journal      = {CoRR},
  volume       = {abs/1810.08280},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.08280},
  eprinttype    = {arXiv},
  eprint       = {1810.08280},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-08280.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/StevensSRHHD17,
  author       = {Rock Stevens and
                  Octavian Suciu and
                  Andrew Ruef and
                  Sanghyun Hong and
                  Michael W. Hicks and
                  Tudor Dumitras},
  title        = {Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning},
  journal      = {CoRR},
  volume       = {abs/1701.04739},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.04739},
  eprinttype    = {arXiv},
  eprint       = {1701.04739},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/StevensSRHHD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SabottkeSD15,
  author       = {Carl Sabottke and
                  Octavian Suciu and
                  Tudor Dumitras},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter
                  for Predicting Real-World Exploits},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {1041--1056},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sabottke},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SabottkeSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}