BibTeX records: Shruti Tople

download as .bib file

@article{DBLP:journals/corr/abs-2402-14397,
  author       = {Giovanni Cherubin and
                  Boris K{\"{o}}pf and
                  Andrew Paverd and
                  Shruti Tople and
                  Lukas Wutschitz and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Closed-Form Bounds for {DP-SGD} against Record-level Inference},
  journal      = {CoRR},
  volume       = {abs/2402.14397},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.14397},
  doi          = {10.48550/ARXIV.2402.14397},
  eprinttype    = {arXiv},
  eprint       = {2402.14397},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-14397.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/BeguelinWTSRPNK23,
  author       = {Santiago Zanella B{\'{e}}guelin and
                  Lukas Wutschitz and
                  Shruti Tople and
                  Ahmed Salem and
                  Victor R{\"{u}}hle and
                  Andrew Paverd and
                  Mohammad Naseri and
                  Boris K{\"{o}}pf and
                  Daniel Jones},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Bayesian Estimation of Differential Privacy},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {40624--40636},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/zanella-beguelin23a.html},
  timestamp    = {Mon, 28 Aug 2023 17:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/BeguelinWTSRPNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SalemCEKPSTB23,
  author       = {Ahmed Salem and
                  Giovanni Cherubin and
                  David Evans and
                  Boris K{\"{o}}pf and
                  Andrew Paverd and
                  Anshuman Suri and
                  Shruti Tople and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {SoK: Let the Privacy Games Begin! {A} Unified Treatment of Data Inference
                  Privacy in Machine Learning},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {327--345},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179281},
  doi          = {10.1109/SP46215.2023.10179281},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SalemCEKPSTB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LukasSSTWB23,
  author       = {Nils Lukas and
                  Ahmed Salem and
                  Robert Sim and
                  Shruti Tople and
                  Lukas Wutschitz and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Analyzing Leakage of Personally Identifiable Information in Language
                  Models},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {346--363},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179300},
  doi          = {10.1109/SP46215.2023.10179300},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LukasSSTWB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-00539,
  author       = {Nils Lukas and
                  Ahmed Salem and
                  Robert Sim and
                  Shruti Tople and
                  Lukas Wutschitz and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Analyzing Leakage of Personally Identifiable Information in Language
                  Models},
  journal      = {CoRR},
  volume       = {abs/2302.00539},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.00539},
  doi          = {10.48550/ARXIV.2302.00539},
  eprinttype    = {arXiv},
  eprint       = {2302.00539},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-00539.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-01190,
  author       = {Marlon Tobaben and
                  Aliaksandra Shysheya and
                  John Bronskill and
                  Andrew Paverd and
                  Shruti Tople and
                  Santiago Zanella B{\'{e}}guelin and
                  Richard E. Turner and
                  Antti Honkela},
  title        = {On the Efficacy of Differentially Private Few-shot Image Classification},
  journal      = {CoRR},
  volume       = {abs/2302.01190},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.01190},
  doi          = {10.48550/ARXIV.2302.01190},
  eprinttype    = {arXiv},
  eprint       = {2302.01190},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-01190.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-05093,
  author       = {Ana{-}Maria Cretu and
                  Daniel Jones and
                  Yves{-}Alexandre de Montjoye and
                  Shruti Tople},
  title        = {Re-aligning Shadow Models can Improve White-box Membership Inference
                  Attacks},
  journal      = {CoRR},
  volume       = {abs/2306.05093},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.05093},
  doi          = {10.48550/ARXIV.2306.05093},
  eprinttype    = {arXiv},
  eprint       = {2306.05093},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-05093.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-08015,
  author       = {Jihye Choi and
                  Shruti Tople and
                  Varun Chandrasekaran and
                  Somesh Jha},
  title        = {Why Train More? Effective and Efficient Membership Inference via Memorization},
  journal      = {CoRR},
  volume       = {abs/2310.08015},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.08015},
  doi          = {10.48550/ARXIV.2310.08015},
  eprinttype    = {arXiv},
  eprint       = {2310.08015},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-08015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-18362,
  author       = {Valentin Hartmann and
                  Anshuman Suri and
                  Vincent Bindschaedler and
                  David Evans and
                  Shruti Tople and
                  Robert West},
  title        = {SoK: Memorization in General-Purpose Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2310.18362},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.18362},
  doi          = {10.48550/ARXIV.2310.18362},
  eprinttype    = {arXiv},
  eprint       = {2310.18362},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-18362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-15792,
  author       = {Lukas Wutschitz and
                  Boris K{\"{o}}pf and
                  Andrew Paverd and
                  Saravan Rajmohan and
                  Ahmed Salem and
                  Shruti Tople and
                  Santiago Zanella B{\'{e}}guelin and
                  Menglin Xia and
                  Victor R{\"{u}}hle},
  title        = {Rethinking Privacy in Machine Learning Pipelines from an Information
                  Flow Control Perspective},
  journal      = {CoRR},
  volume       = {abs/2311.15792},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.15792},
  doi          = {10.48550/ARXIV.2311.15792},
  eprinttype    = {arXiv},
  eprint       = {2311.15792},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-15792.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmlr/XuMLTDF22,
  author       = {Yixi Xu and
                  Sumit Mukherjee and
                  Xiyang Liu and
                  Shruti Tople and
                  Rahul Dodhia and
                  Juan M. Lavista Ferres},
  title        = {Mace: {A} flexible framework for membership privacy estimation in
                  generative models},
  journal      = {Trans. Mach. Learn. Res.},
  volume       = {2022},
  year         = {2022},
  url          = {https://openreview.net/forum?id=Zxm0kNe3u7},
  timestamp    = {Fri, 19 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmlr/XuMLTDF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BalutaSHTS22,
  author       = {Teodora Baluta and
                  Shiqi Shen and
                  S. Hitarth and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Membership Inference Attacks and Generalization: {A} Causal Perspective},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {249--262},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560694},
  doi          = {10.1145/3548606.3560694},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BalutaSHTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-05199,
  author       = {Santiago Zanella B{\'{e}}guelin and
                  Lukas Wutschitz and
                  Shruti Tople and
                  Ahmed Salem and
                  Victor R{\"{u}}hle and
                  Andrew Paverd and
                  Mohammad Naseri and
                  Boris K{\"{o}}pf and
                  Daniel Jones},
  title        = {Bayesian Estimation of Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2206.05199},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.05199},
  doi          = {10.48550/ARXIV.2206.05199},
  eprinttype    = {arXiv},
  eprint       = {2206.05199},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-05199.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-08541,
  author       = {Valentin Hartmann and
                  L{\'{e}}o Meynent and
                  Maxime Peyrard and
                  Dimitrios Dimitriadis and
                  Shruti Tople and
                  Robert West},
  title        = {Distribution inference risks: Identifying and mitigating sources of
                  leakage},
  journal      = {CoRR},
  volume       = {abs/2209.08541},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.08541},
  doi          = {10.48550/ARXIV.2209.08541},
  eprinttype    = {arXiv},
  eprint       = {2209.08541},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-08541.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-08615,
  author       = {Teodora Baluta and
                  Shiqi Shen and
                  S. Hitarth and
                  Shruti Tople and
                  Prateek Saxena},
  title        = {Membership Inference Attacks and Generalization: {A} Causal Perspective},
  journal      = {CoRR},
  volume       = {abs/2209.08615},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.08615},
  doi          = {10.48550/ARXIV.2209.08615},
  eprinttype    = {arXiv},
  eprint       = {2209.08615},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-08615.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-01834,
  author       = {Xiaoyang Wang and
                  Dimitrios Dimitriadis and
                  Sanmi Koyejo and
                  Shruti Tople},
  title        = {Invariant Aggregator for Defending Federated Backdoor Attacks},
  journal      = {CoRR},
  volume       = {abs/2210.01834},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.01834},
  doi          = {10.48550/ARXIV.2210.01834},
  eprinttype    = {arXiv},
  eprint       = {2210.01834},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-01834.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-10986,
  author       = {Ahmed Salem and
                  Giovanni Cherubin and
                  David Evans and
                  Boris K{\"{o}}pf and
                  Andrew Paverd and
                  Anshuman Suri and
                  Shruti Tople and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {SoK: Let The Privacy Games Begin! {A} Unified Treatment of Data Inference
                  Privacy in Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2212.10986},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.10986},
  doi          = {10.48550/ARXIV.2212.10986},
  eprinttype    = {arXiv},
  eprint       = {2212.10986},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-10986.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WaghTBKMR21,
  author       = {Sameer Wagh and
                  Shruti Tople and
                  Fabrice Benhamouda and
                  Eyal Kushilevitz and
                  Prateek Mittal and
                  Tal Rabin},
  title        = {Falcon: Honest-Majority Maliciously Secure Framework for Private Deep
                  Learning},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {1},
  pages        = {188--208},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0011},
  doi          = {10.2478/POPETS-2021-0011},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/WaghTBKMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/MahajanTS21,
  author       = {Divyat Mahajan and
                  Shruti Tople and
                  Amit Sharma},
  editor       = {Marina Meila and
                  Tong Zhang},
  title        = {Domain Generalization using Causal Matching},
  booktitle    = {Proceedings of the 38th International Conference on Machine Learning,
                  {ICML} 2021, 18-24 July 2021, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {139},
  pages        = {7313--7324},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {http://proceedings.mlr.press/v139/mahajan21b.html},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/MahajanTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/BeguelinTPK21,
  author       = {Santiago Zanella B{\'{e}}guelin and
                  Shruti Tople and
                  Andrew Paverd and
                  Boris K{\"{o}}pf},
  editor       = {Marina Meila and
                  Tong Zhang},
  title        = {Grey-box Extraction of Natural Language Models},
  booktitle    = {Proceedings of the 38th International Conference on Machine Learning,
                  {ICML} 2021, 18-24 July 2021, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {139},
  pages        = {12278--12286},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {http://proceedings.mlr.press/v139/zanella-beguelin21a.html},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/BeguelinTPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001TO21,
  author       = {Wanrong Zhang and
                  Shruti Tople and
                  Olga Ohrimenko},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Leakage of Dataset Properties in Multi-Party Machine Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {2687--2704},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-wanrong},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0001TO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13144,
  author       = {Varun Chandrasekaran and
                  Darren Edge and
                  Somesh Jha and
                  Amit Sharma and
                  Cheng Zhang and
                  Shruti Tople},
  title        = {Causally Constrained Data Synthesis for Private Data Release},
  journal      = {CoRR},
  volume       = {abs/2105.13144},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13144},
  eprinttype    = {arXiv},
  eprint       = {2105.13144},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13144.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-03369,
  author       = {Divyat Mahajan and
                  Shruti Tople and
                  Amit Sharma},
  title        = {The Connection between Out-of-Distribution Generalization and Privacy
                  of {ML} Models},
  journal      = {CoRR},
  volume       = {abs/2110.03369},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.03369},
  eprinttype    = {arXiv},
  eprint       = {2110.03369},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-03369.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BeguelinWTRPOKB20,
  author       = {Santiago Zanella B{\'{e}}guelin and
                  Lukas Wutschitz and
                  Shruti Tople and
                  Victor R{\"{u}}hle and
                  Andrew Paverd and
                  Olga Ohrimenko and
                  Boris K{\"{o}}pf and
                  Marc Brockschmidt},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Analyzing Information Leakage of Updates to Natural Language Models},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {363--375},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417880},
  doi          = {10.1145/3372297.3417880},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BeguelinWTRPOKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/JiaTMGSL20,
  author       = {Yaoqi Jia and
                  Shruti Tople and
                  Tarik Moataz and
                  Deli Gong and
                  Prateek Saxena and
                  Zhenkai Liang},
  title        = {Robust {P2P} Primitives Using {SGX} Enclaves},
  booktitle    = {40th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2020, Singapore, November 29 - December 1, 2020},
  pages        = {1185--1186},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDCS47774.2020.00134},
  doi          = {10.1109/ICDCS47774.2020.00134},
  timestamp    = {Tue, 02 Mar 2021 12:16:24 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/JiaTMGSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/TopleSN20,
  author       = {Shruti Tople and
                  Amit Sharma and
                  Aditya Nori},
  title        = {Alleviating Privacy Attacks via Causal Learning},
  booktitle    = {Proceedings of the 37th International Conference on Machine Learning,
                  {ICML} 2020, 13-18 July 2020, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {119},
  pages        = {9537--9547},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v119/tople20a.html},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/TopleSN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiaTMGSL20,
  author       = {Yaoqi Jia and
                  Shruti Tople and
                  Tarik Moataz and
                  Deli Gong and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Robust {P2P} Primitives Using {SGX} Enclaves},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {209--224},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/jia},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JiaTMGSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-02438,
  author       = {Bijeeta Pal and
                  Shruti Tople},
  title        = {To Transfer or Not to Transfer: Misclassification Attacks Against
                  Transfer Learned Text Classifiers},
  journal      = {CoRR},
  volume       = {abs/2001.02438},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.02438},
  eprinttype    = {arXiv},
  eprint       = {2001.02438},
  timestamp    = {Mon, 13 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-02438.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-02229,
  author       = {Sameer Wagh and
                  Shruti Tople and
                  Fabrice Benhamouda and
                  Eyal Kushilevitz and
                  Prateek Mittal and
                  Tal Rabin},
  title        = {{FALCON:} Honest-Majority Maliciously Secure Framework for Private
                  Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2004.02229},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.02229},
  eprinttype    = {arXiv},
  eprint       = {2004.02229},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-02229.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-07267,
  author       = {Wanrong Zhang and
                  Shruti Tople and
                  Olga Ohrimenko},
  title        = {Dataset-Level Attribute Leakage in Collaborative Learning},
  journal      = {CoRR},
  volume       = {abs/2006.07267},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.07267},
  eprinttype    = {arXiv},
  eprint       = {2006.07267},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-07267.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-07500,
  author       = {Divyat Mahajan and
                  Shruti Tople and
                  Amit Sharma},
  title        = {Domain Generalization using Causal Matching},
  journal      = {CoRR},
  volume       = {abs/2006.07500},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.07500},
  eprinttype    = {arXiv},
  eprint       = {2006.07500},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-07500.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-14583,
  author       = {Dongge Han and
                  Shruti Tople and
                  Alex Rogers and
                  Michael J. Wooldridge and
                  Olga Ohrimenko and
                  Sebastian Tschiatschek},
  title        = {Replication-Robust Payoff-Allocation with Applications in Machine
                  Learning Marketplaces},
  journal      = {CoRR},
  volume       = {abs/2006.14583},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.14583},
  eprinttype    = {arXiv},
  eprint       = {2006.14583},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-14583.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-12934,
  author       = {Anshul Aggarwal and
                  Trevor E. Carlson and
                  Reza Shokri and
                  Shruti Tople},
  title        = {{SOTERIA:} In Search of Efficient Neural Networks for Private Inference},
  journal      = {CoRR},
  volume       = {abs/2007.12934},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.12934},
  eprinttype    = {arXiv},
  eprint       = {2007.12934},
  timestamp    = {Wed, 29 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-12934.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TopleJS19,
  author       = {Shruti Tople and
                  Yaoqi Jia and
                  Prateek Saxena},
  title        = {{PRO-ORAM:} Practical Read-Only Oblivious {RAM}},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {197--211},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/tople},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/TopleJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-12732,
  author       = {Shruti Tople and
                  Amit Sharma and
                  Aditya Nori},
  title        = {Alleviating Privacy Attacks via Causal Learning},
  journal      = {CoRR},
  volume       = {abs/1909.12732},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.12732},
  eprinttype    = {arXiv},
  eprint       = {1909.12732},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-12732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-09052,
  author       = {Olga Ohrimenko and
                  Shruti Tople and
                  Sebastian Tschiatschek},
  title        = {Collaborative Machine Learning Markets with Data-Replication-Robust
                  Payments},
  journal      = {CoRR},
  volume       = {abs/1911.09052},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.09052},
  eprinttype    = {arXiv},
  eprint       = {1911.09052},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-09052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-02919,
  author       = {Stephanie L. Hyland and
                  Shruti Tople},
  title        = {On the Intrinsic Privacy of Stochastic Gradient Descent},
  journal      = {CoRR},
  volume       = {abs/1912.02919},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.02919},
  eprinttype    = {arXiv},
  eprint       = {1912.02919},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-02919.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-07942,
  author       = {Shruti Tople and
                  Marc Brockschmidt and
                  Boris K{\"{o}}pf and
                  Olga Ohrimenko and
                  Santiago Zanella B{\'{e}}guelin},
  title        = {Analyzing Privacy Loss in Updates of Natural Language Models},
  journal      = {CoRR},
  volume       = {abs/1912.07942},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.07942},
  eprinttype    = {arXiv},
  eprint       = {1912.07942},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-07942.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ToplePKS18,
  author       = {Shruti Tople and
                  Soyeon Park and
                  Min Suk Kang and
                  Prateek Saxena},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {VeriCount: Verifiable Resource Accounting Using Hardware and Software
                  Isolation},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {657--677},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_34},
  doi          = {10.1007/978-3-319-93387-0\_34},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ToplePKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-00602,
  author       = {Shruti Tople and
                  Karan Grover and
                  Shweta Shinde and
                  Ranjita Bhagwan and
                  Ramachandran Ramjee},
  title        = {Privado: Practical and Secure {DNN} Inference},
  journal      = {CoRR},
  volume       = {abs/1810.00602},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.00602},
  eprinttype    = {arXiv},
  eprint       = {1810.00602},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-00602.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TopleJS18,
  author       = {Shruti Tople and
                  Yaoqi Jia and
                  Prateek Saxena},
  title        = {{PRO-ORAM:} Constant Latency Read-Only Oblivious {RAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TopleJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/TopleS17,
  author       = {Shruti Tople and
                  Prateek Saxena},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {On the Trade-Offs in Oblivious Execution Techniques},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {25--47},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_2},
  doi          = {10.1007/978-3-319-60876-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/TopleS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KumarFTS17,
  author       = {Amrit Kumar and
                  Cl{\'{e}}ment Fischer and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {A Traceability Analysis of Monero's Blockchain},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {153--173},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_9},
  doi          = {10.1007/978-3-319-66399-9\_9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KumarFTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShindeTTS17,
  author       = {Shweta Shinde and
                  Dat Le Tien and
                  Shruti Tople and
                  Prateek Saxena},
  title        = {Panoply: Low-TCB Linux Applications With {SGX} Enclaves},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/panoply-low-tcb-linux-applications-sgx-enclaves/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ShindeTTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiaTMGSL17,
  author       = {Yaoqi Jia and
                  Shruti Tople and
                  Tarik Moataz and
                  Deli Gong and
                  Prateek Saxena and
                  Zhenkai Liang},
  title        = {Robust Synchronous {P2P} Primitives Using {SGX} Enclaves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiaTMGSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarFTS17,
  author       = {Amrit Kumar and
                  Cl{\'{e}}ment Fischer and
                  Shruti Tople and
                  Prateek Saxena},
  title        = {A Traceability Analysis of Monero's Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarFTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TopleDSC17,
  author       = {Shruti Tople and
                  Hung Dang and
                  Prateek Saxena and
                  Ee{-}Chien Chang},
  title        = {PermuteRam: Optimizing Oblivious Computation for Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/885},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TopleDSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShenTS16,
  author       = {Shiqi Shen and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {Auror: defending against poisoning attacks in collaborative deep learning
                  systems},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {508--519},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991125},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShenTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JiaMTS16,
  author       = {Yaoqi Jia and
                  Tarik Moataz and
                  Shruti Tople and
                  Prateek Saxena},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {OblivP2P: An Oblivious Peer-to-Peer Content Sharing System},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {945--962},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/jia},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JiaMTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LimTSC14,
  author       = {Hoon Wei Lim and
                  Shruti Tople and
                  Prateek Saxena and
                  Ee{-}Chien Chang},
  title        = {Faster Secure Arithmetic Computation Using Switchable Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {539},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/539},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LimTSC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TopleSCS13,
  author       = {Shruti Tople and
                  Shweta Shinde and
                  Zhaofeng Chen and
                  Prateek Saxena},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {{AUTOCRYPT:} enabling homomorphic computation on servers to protect
                  sensitive web content},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1297--1310},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516666},
  doi          = {10.1145/2508859.2516666},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TopleSCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DongCSTSL13,
  author       = {Xinshu Dong and
                  Zhaofeng Chen and
                  Hossein Siadati and
                  Shruti Tople and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Protecting sensitive web content from client-side vulnerabilities
                  with {CRYPTONS}},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1311--1324},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516743},
  doi          = {10.1145/2508859.2516743},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DongCSTSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics