default search action
BibTeX records: Octavian Suciu
@inproceedings{DBLP:conf/uss/SuciuNLBD22, author = {Octavian Suciu and Connor Nelson and Zhuoer Lyu and Tiffany Bao and Tudor Dumitras}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {377--394}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/suciu}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/SuciuNLBD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Suciu21, author = {Octavian Suciu}, title = {Data-Driven Techniques For Vulnerability Assessments}, school = {University of Maryland, College Park, MD, {USA}}, year = {2021}, url = {https://hdl.handle.net/1903/28370}, doi = {10.13016/WFED-WU0H}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Suciu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-07869, author = {Octavian Suciu and Connor Nelson and Zhuoer Lyu and Tiffany Bao and Tudor Dumitras}, title = {Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits}, journal = {CoRR}, volume = {abs/2102.07869}, year = {2021}, url = {https://arxiv.org/abs/2102.07869}, eprinttype = {arXiv}, eprint = {2102.07869}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-07869.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SuciuCJ19, author = {Octavian Suciu and Scott E. Coull and Jeffrey Johns}, title = {Exploring Adversarial Examples in Malware Detection}, booktitle = {2019 {IEEE} Security and Privacy Workshops, {SP} Workshops 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {8--14}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SPW.2019.00015}, doi = {10.1109/SPW.2019.00015}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/SuciuCJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaifs/SuciuCJ18, author = {Octavian Suciu and Scott E. Coull and Jeffrey Johns}, editor = {Joseph B. Collins and Prithviraj Dasgupta and Ranjeev Mittu}, title = {Exploring Adversarial Examples in Malware Detection}, booktitle = {Proceedings of the {AAAI} Symposium on Adversary-Aware Learning Techniques and Trends in Cybersecurity {(ALEC} 2018) co-located with the Association for the Advancement of Artificial Intelligence 2018 Fall Symposium Series {(AAAI-FSS} 2018), Arlington, Virginia, USA, October 18-20, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2269}, pages = {11--16}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2269/FSS-18\_paper\_44.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:39 +0100}, biburl = {https://dblp.org/rec/conf/aaaifs/SuciuCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ShafahiHNSSDG18, author = {Ali Shafahi and W. Ronny Huang and Mahyar Najibi and Octavian Suciu and Christoph Studer and Tudor Dumitras and Tom Goldstein}, editor = {Samy Bengio and Hanna M. Wallach and Hugo Larochelle and Kristen Grauman and Nicol{\`{o}} Cesa{-}Bianchi and Roman Garnett}, title = {Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks}, booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr{\'{e}}al, Canada}, pages = {6106--6116}, year = {2018}, url = {https://proceedings.neurips.cc/paper/2018/hash/22722a343513ed45f14905eb07621686-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/ShafahiHNSSDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/DumitrasKMS18, author = {Tudor Dumitras and Yigitcan Kaya and Radu Marginean and Octavian Suciu}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Too Big to {FAIL:} What You Need to Know Before Attacking a Machine Learning System}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {150--162}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_17}, doi = {10.1007/978-3-030-03251-7\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/DumitrasKMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SuciuMKDD18, author = {Octavian Suciu and Radu Marginean and Yigitcan Kaya and Hal Daum{\'{e}} III and Tudor Dumitras}, editor = {William Enck and Adrienne Porter Felt}, title = {When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1299--1316}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/suciu}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/SuciuMKDD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-06975, author = {Octavian Suciu and Radu Marginean and Yigitcan Kaya and Hal Daum{\'{e}} III and Tudor Dumitras}, title = {When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks}, journal = {CoRR}, volume = {abs/1803.06975}, year = {2018}, url = {http://arxiv.org/abs/1803.06975}, eprinttype = {arXiv}, eprint = {1803.06975}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-06975.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-00792, author = {Ali Shafahi and W. Ronny Huang and Mahyar Najibi and Octavian Suciu and Christoph Studer and Tudor Dumitras and Tom Goldstein}, title = {Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks}, journal = {CoRR}, volume = {abs/1804.00792}, year = {2018}, url = {http://arxiv.org/abs/1804.00792}, eprinttype = {arXiv}, eprint = {1804.00792}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-00792.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-08280, author = {Octavian Suciu and Scott E. Coull and Jeffrey Johns}, title = {Exploring Adversarial Examples in Malware Detection}, journal = {CoRR}, volume = {abs/1810.08280}, year = {2018}, url = {http://arxiv.org/abs/1810.08280}, eprinttype = {arXiv}, eprint = {1810.08280}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-08280.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/StevensSRHHD17, author = {Rock Stevens and Octavian Suciu and Andrew Ruef and Sanghyun Hong and Michael W. Hicks and Tudor Dumitras}, title = {Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning}, journal = {CoRR}, volume = {abs/1701.04739}, year = {2017}, url = {http://arxiv.org/abs/1701.04739}, eprinttype = {arXiv}, eprint = {1701.04739}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/StevensSRHHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SabottkeSD15, author = {Carl Sabottke and Octavian Suciu and Tudor Dumitras}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {1041--1056}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/sabottke}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/SabottkeSD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.