Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Shruti Tople
@article{DBLP:journals/corr/abs-2402-14397, author = {Giovanni Cherubin and Boris K{\"{o}}pf and Andrew Paverd and Shruti Tople and Lukas Wutschitz and Santiago Zanella B{\'{e}}guelin}, title = {Closed-Form Bounds for {DP-SGD} against Record-level Inference}, journal = {CoRR}, volume = {abs/2402.14397}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.14397}, doi = {10.48550/ARXIV.2402.14397}, eprinttype = {arXiv}, eprint = {2402.14397}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-14397.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/BeguelinWTSRPNK23, author = {Santiago Zanella B{\'{e}}guelin and Lukas Wutschitz and Shruti Tople and Ahmed Salem and Victor R{\"{u}}hle and Andrew Paverd and Mohammad Naseri and Boris K{\"{o}}pf and Daniel Jones}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Bayesian Estimation of Differential Privacy}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {40624--40636}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/zanella-beguelin23a.html}, timestamp = {Mon, 28 Aug 2023 17:23:08 +0200}, biburl = {https://dblp.org/rec/conf/icml/BeguelinWTSRPNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SalemCEKPSTB23, author = {Ahmed Salem and Giovanni Cherubin and David Evans and Boris K{\"{o}}pf and Andrew Paverd and Anshuman Suri and Shruti Tople and Santiago Zanella B{\'{e}}guelin}, title = {SoK: Let the Privacy Games Begin! {A} Unified Treatment of Data Inference Privacy in Machine Learning}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {327--345}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179281}, doi = {10.1109/SP46215.2023.10179281}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/SalemCEKPSTB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LukasSSTWB23, author = {Nils Lukas and Ahmed Salem and Robert Sim and Shruti Tople and Lukas Wutschitz and Santiago Zanella B{\'{e}}guelin}, title = {Analyzing Leakage of Personally Identifiable Information in Language Models}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {346--363}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179300}, doi = {10.1109/SP46215.2023.10179300}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LukasSSTWB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-00539, author = {Nils Lukas and Ahmed Salem and Robert Sim and Shruti Tople and Lukas Wutschitz and Santiago Zanella B{\'{e}}guelin}, title = {Analyzing Leakage of Personally Identifiable Information in Language Models}, journal = {CoRR}, volume = {abs/2302.00539}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.00539}, doi = {10.48550/ARXIV.2302.00539}, eprinttype = {arXiv}, eprint = {2302.00539}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-00539.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-01190, author = {Marlon Tobaben and Aliaksandra Shysheya and John Bronskill and Andrew Paverd and Shruti Tople and Santiago Zanella B{\'{e}}guelin and Richard E. Turner and Antti Honkela}, title = {On the Efficacy of Differentially Private Few-shot Image Classification}, journal = {CoRR}, volume = {abs/2302.01190}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.01190}, doi = {10.48550/ARXIV.2302.01190}, eprinttype = {arXiv}, eprint = {2302.01190}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-01190.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-05093, author = {Ana{-}Maria Cretu and Daniel Jones and Yves{-}Alexandre de Montjoye and Shruti Tople}, title = {Re-aligning Shadow Models can Improve White-box Membership Inference Attacks}, journal = {CoRR}, volume = {abs/2306.05093}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.05093}, doi = {10.48550/ARXIV.2306.05093}, eprinttype = {arXiv}, eprint = {2306.05093}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-05093.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-08015, author = {Jihye Choi and Shruti Tople and Varun Chandrasekaran and Somesh Jha}, title = {Why Train More? Effective and Efficient Membership Inference via Memorization}, journal = {CoRR}, volume = {abs/2310.08015}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.08015}, doi = {10.48550/ARXIV.2310.08015}, eprinttype = {arXiv}, eprint = {2310.08015}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-08015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-18362, author = {Valentin Hartmann and Anshuman Suri and Vincent Bindschaedler and David Evans and Shruti Tople and Robert West}, title = {SoK: Memorization in General-Purpose Large Language Models}, journal = {CoRR}, volume = {abs/2310.18362}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.18362}, doi = {10.48550/ARXIV.2310.18362}, eprinttype = {arXiv}, eprint = {2310.18362}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-18362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-15792, author = {Lukas Wutschitz and Boris K{\"{o}}pf and Andrew Paverd and Saravan Rajmohan and Ahmed Salem and Shruti Tople and Santiago Zanella B{\'{e}}guelin and Menglin Xia and Victor R{\"{u}}hle}, title = {Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective}, journal = {CoRR}, volume = {abs/2311.15792}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.15792}, doi = {10.48550/ARXIV.2311.15792}, eprinttype = {arXiv}, eprint = {2311.15792}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-15792.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmlr/XuMLTDF22, author = {Yixi Xu and Sumit Mukherjee and Xiyang Liu and Shruti Tople and Rahul Dodhia and Juan M. Lavista Ferres}, title = {Mace: {A} flexible framework for membership privacy estimation in generative models}, journal = {Trans. Mach. Learn. Res.}, volume = {2022}, year = {2022}, url = {https://openreview.net/forum?id=Zxm0kNe3u7}, timestamp = {Fri, 19 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmlr/XuMLTDF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalutaSHTS22, author = {Teodora Baluta and Shiqi Shen and S. Hitarth and Shruti Tople and Prateek Saxena}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Membership Inference Attacks and Generalization: {A} Causal Perspective}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {249--262}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560694}, doi = {10.1145/3548606.3560694}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BalutaSHTS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-05199, author = {Santiago Zanella B{\'{e}}guelin and Lukas Wutschitz and Shruti Tople and Ahmed Salem and Victor R{\"{u}}hle and Andrew Paverd and Mohammad Naseri and Boris K{\"{o}}pf and Daniel Jones}, title = {Bayesian Estimation of Differential Privacy}, journal = {CoRR}, volume = {abs/2206.05199}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.05199}, doi = {10.48550/ARXIV.2206.05199}, eprinttype = {arXiv}, eprint = {2206.05199}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-05199.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-08541, author = {Valentin Hartmann and L{\'{e}}o Meynent and Maxime Peyrard and Dimitrios Dimitriadis and Shruti Tople and Robert West}, title = {Distribution inference risks: Identifying and mitigating sources of leakage}, journal = {CoRR}, volume = {abs/2209.08541}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.08541}, doi = {10.48550/ARXIV.2209.08541}, eprinttype = {arXiv}, eprint = {2209.08541}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-08541.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-08615, author = {Teodora Baluta and Shiqi Shen and S. Hitarth and Shruti Tople and Prateek Saxena}, title = {Membership Inference Attacks and Generalization: {A} Causal Perspective}, journal = {CoRR}, volume = {abs/2209.08615}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.08615}, doi = {10.48550/ARXIV.2209.08615}, eprinttype = {arXiv}, eprint = {2209.08615}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-08615.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-01834, author = {Xiaoyang Wang and Dimitrios Dimitriadis and Sanmi Koyejo and Shruti Tople}, title = {Invariant Aggregator for Defending Federated Backdoor Attacks}, journal = {CoRR}, volume = {abs/2210.01834}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.01834}, doi = {10.48550/ARXIV.2210.01834}, eprinttype = {arXiv}, eprint = {2210.01834}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-01834.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-10986, author = {Ahmed Salem and Giovanni Cherubin and David Evans and Boris K{\"{o}}pf and Andrew Paverd and Anshuman Suri and Shruti Tople and Santiago Zanella B{\'{e}}guelin}, title = {SoK: Let The Privacy Games Begin! {A} Unified Treatment of Data Inference Privacy in Machine Learning}, journal = {CoRR}, volume = {abs/2212.10986}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.10986}, doi = {10.48550/ARXIV.2212.10986}, eprinttype = {arXiv}, eprint = {2212.10986}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-10986.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/WaghTBKMR21, author = {Sameer Wagh and Shruti Tople and Fabrice Benhamouda and Eyal Kushilevitz and Prateek Mittal and Tal Rabin}, title = {Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {1}, pages = {188--208}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0011}, doi = {10.2478/POPETS-2021-0011}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/WaghTBKMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/MahajanTS21, author = {Divyat Mahajan and Shruti Tople and Amit Sharma}, editor = {Marina Meila and Tong Zhang}, title = {Domain Generalization using Causal Matching}, booktitle = {Proceedings of the 38th International Conference on Machine Learning, {ICML} 2021, 18-24 July 2021, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {139}, pages = {7313--7324}, publisher = {{PMLR}}, year = {2021}, url = {http://proceedings.mlr.press/v139/mahajan21b.html}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/MahajanTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/BeguelinTPK21, author = {Santiago Zanella B{\'{e}}guelin and Shruti Tople and Andrew Paverd and Boris K{\"{o}}pf}, editor = {Marina Meila and Tong Zhang}, title = {Grey-box Extraction of Natural Language Models}, booktitle = {Proceedings of the 38th International Conference on Machine Learning, {ICML} 2021, 18-24 July 2021, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {139}, pages = {12278--12286}, publisher = {{PMLR}}, year = {2021}, url = {http://proceedings.mlr.press/v139/zanella-beguelin21a.html}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/BeguelinTPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001TO21, author = {Wanrong Zhang and Shruti Tople and Olga Ohrimenko}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Leakage of Dataset Properties in Multi-Party Machine Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2687--2704}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/zhang-wanrong}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/0001TO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13144, author = {Varun Chandrasekaran and Darren Edge and Somesh Jha and Amit Sharma and Cheng Zhang and Shruti Tople}, title = {Causally Constrained Data Synthesis for Private Data Release}, journal = {CoRR}, volume = {abs/2105.13144}, year = {2021}, url = {https://arxiv.org/abs/2105.13144}, eprinttype = {arXiv}, eprint = {2105.13144}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13144.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-03369, author = {Divyat Mahajan and Shruti Tople and Amit Sharma}, title = {The Connection between Out-of-Distribution Generalization and Privacy of {ML} Models}, journal = {CoRR}, volume = {abs/2110.03369}, year = {2021}, url = {https://arxiv.org/abs/2110.03369}, eprinttype = {arXiv}, eprint = {2110.03369}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-03369.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BeguelinWTRPOKB20, author = {Santiago Zanella B{\'{e}}guelin and Lukas Wutschitz and Shruti Tople and Victor R{\"{u}}hle and Andrew Paverd and Olga Ohrimenko and Boris K{\"{o}}pf and Marc Brockschmidt}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Analyzing Information Leakage of Updates to Natural Language Models}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {363--375}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417880}, doi = {10.1145/3372297.3417880}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BeguelinWTRPOKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/JiaTMGSL20, author = {Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang}, title = {Robust {P2P} Primitives Using {SGX} Enclaves}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {1185--1186}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00134}, doi = {10.1109/ICDCS47774.2020.00134}, timestamp = {Tue, 02 Mar 2021 12:16:24 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/JiaTMGSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/TopleSN20, author = {Shruti Tople and Amit Sharma and Aditya Nori}, title = {Alleviating Privacy Attacks via Causal Learning}, booktitle = {Proceedings of the 37th International Conference on Machine Learning, {ICML} 2020, 13-18 July 2020, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {119}, pages = {9537--9547}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v119/tople20a.html}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/TopleSN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JiaTMGSL20, author = {Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang}, editor = {Manuel Egele and Leyla Bilge}, title = {Robust {P2P} Primitives Using {SGX} Enclaves}, booktitle = {23rd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020}, pages = {209--224}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/raid2020/presentation/jia}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/raid/JiaTMGSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-02438, author = {Bijeeta Pal and Shruti Tople}, title = {To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers}, journal = {CoRR}, volume = {abs/2001.02438}, year = {2020}, url = {http://arxiv.org/abs/2001.02438}, eprinttype = {arXiv}, eprint = {2001.02438}, timestamp = {Mon, 13 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-02438.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-02229, author = {Sameer Wagh and Shruti Tople and Fabrice Benhamouda and Eyal Kushilevitz and Prateek Mittal and Tal Rabin}, title = {{FALCON:} Honest-Majority Maliciously Secure Framework for Private Deep Learning}, journal = {CoRR}, volume = {abs/2004.02229}, year = {2020}, url = {https://arxiv.org/abs/2004.02229}, eprinttype = {arXiv}, eprint = {2004.02229}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-02229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-07267, author = {Wanrong Zhang and Shruti Tople and Olga Ohrimenko}, title = {Dataset-Level Attribute Leakage in Collaborative Learning}, journal = {CoRR}, volume = {abs/2006.07267}, year = {2020}, url = {https://arxiv.org/abs/2006.07267}, eprinttype = {arXiv}, eprint = {2006.07267}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-07267.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-07500, author = {Divyat Mahajan and Shruti Tople and Amit Sharma}, title = {Domain Generalization using Causal Matching}, journal = {CoRR}, volume = {abs/2006.07500}, year = {2020}, url = {https://arxiv.org/abs/2006.07500}, eprinttype = {arXiv}, eprint = {2006.07500}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-07500.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-14583, author = {Dongge Han and Shruti Tople and Alex Rogers and Michael J. Wooldridge and Olga Ohrimenko and Sebastian Tschiatschek}, title = {Replication-Robust Payoff-Allocation with Applications in Machine Learning Marketplaces}, journal = {CoRR}, volume = {abs/2006.14583}, year = {2020}, url = {https://arxiv.org/abs/2006.14583}, eprinttype = {arXiv}, eprint = {2006.14583}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-14583.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-12934, author = {Anshul Aggarwal and Trevor E. Carlson and Reza Shokri and Shruti Tople}, title = {{SOTERIA:} In Search of Efficient Neural Networks for Private Inference}, journal = {CoRR}, volume = {abs/2007.12934}, year = {2020}, url = {https://arxiv.org/abs/2007.12934}, eprinttype = {arXiv}, eprint = {2007.12934}, timestamp = {Wed, 29 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-12934.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/TopleJS19, author = {Shruti Tople and Yaoqi Jia and Prateek Saxena}, title = {{PRO-ORAM:} Practical Read-Only Oblivious {RAM}}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {197--211}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/tople}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/TopleJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-12732, author = {Shruti Tople and Amit Sharma and Aditya Nori}, title = {Alleviating Privacy Attacks via Causal Learning}, journal = {CoRR}, volume = {abs/1909.12732}, year = {2019}, url = {http://arxiv.org/abs/1909.12732}, eprinttype = {arXiv}, eprint = {1909.12732}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-12732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-09052, author = {Olga Ohrimenko and Shruti Tople and Sebastian Tschiatschek}, title = {Collaborative Machine Learning Markets with Data-Replication-Robust Payments}, journal = {CoRR}, volume = {abs/1911.09052}, year = {2019}, url = {http://arxiv.org/abs/1911.09052}, eprinttype = {arXiv}, eprint = {1911.09052}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-09052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-02919, author = {Stephanie L. Hyland and Shruti Tople}, title = {On the Intrinsic Privacy of Stochastic Gradient Descent}, journal = {CoRR}, volume = {abs/1912.02919}, year = {2019}, url = {http://arxiv.org/abs/1912.02919}, eprinttype = {arXiv}, eprint = {1912.02919}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-02919.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-07942, author = {Shruti Tople and Marc Brockschmidt and Boris K{\"{o}}pf and Olga Ohrimenko and Santiago Zanella B{\'{e}}guelin}, title = {Analyzing Privacy Loss in Updates of Natural Language Models}, journal = {CoRR}, volume = {abs/1912.07942}, year = {2019}, url = {http://arxiv.org/abs/1912.07942}, eprinttype = {arXiv}, eprint = {1912.07942}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-07942.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ToplePKS18, author = {Shruti Tople and Soyeon Park and Min Suk Kang and Prateek Saxena}, editor = {Bart Preneel and Frederik Vercauteren}, title = {VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {657--677}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_34}, doi = {10.1007/978-3-319-93387-0\_34}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/ToplePKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00602, author = {Shruti Tople and Karan Grover and Shweta Shinde and Ranjita Bhagwan and Ramachandran Ramjee}, title = {Privado: Practical and Secure {DNN} Inference}, journal = {CoRR}, volume = {abs/1810.00602}, year = {2018}, url = {http://arxiv.org/abs/1810.00602}, eprinttype = {arXiv}, eprint = {1810.00602}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00602.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TopleJS18, author = {Shruti Tople and Yaoqi Jia and Prateek Saxena}, title = {{PRO-ORAM:} Constant Latency Read-Only Oblivious {RAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2018}, url = {http://eprint.iacr.org/2018/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TopleJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/TopleS17, author = {Shruti Tople and Prateek Saxena}, editor = {Michalis Polychronakis and Michael Meier}, title = {On the Trade-Offs in Oblivious Execution Techniques}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {25--47}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_2}, doi = {10.1007/978-3-319-60876-1\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/TopleS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KumarFTS17, author = {Amrit Kumar and Cl{\'{e}}ment Fischer and Shruti Tople and Prateek Saxena}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {A Traceability Analysis of Monero's Blockchain}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {153--173}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_9}, doi = {10.1007/978-3-319-66399-9\_9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KumarFTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ShindeTTS17, author = {Shweta Shinde and Dat Le Tien and Shruti Tople and Prateek Saxena}, title = {Panoply: Low-TCB Linux Applications With {SGX} Enclaves}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/panoply-low-tcb-linux-applications-sgx-enclaves/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ShindeTTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiaTMGSL17, author = {Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang}, title = {Robust Synchronous {P2P} Primitives Using {SGX} Enclaves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2017}, url = {http://eprint.iacr.org/2017/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiaTMGSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarFTS17, author = {Amrit Kumar and Cl{\'{e}}ment Fischer and Shruti Tople and Prateek Saxena}, title = {A Traceability Analysis of Monero's Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2017}, url = {http://eprint.iacr.org/2017/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarFTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TopleDSC17, author = {Shruti Tople and Hung Dang and Prateek Saxena and Ee{-}Chien Chang}, title = {PermuteRam: Optimizing Oblivious Computation for Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2017}, url = {http://eprint.iacr.org/2017/885}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TopleDSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShenTS16, author = {Shiqi Shen and Shruti Tople and Prateek Saxena}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {Auror: defending against poisoning attacks in collaborative deep learning systems}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {508--519}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991125}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShenTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JiaMTS16, author = {Yaoqi Jia and Tarik Moataz and Shruti Tople and Prateek Saxena}, editor = {Thorsten Holz and Stefan Savage}, title = {OblivP2P: An Oblivious Peer-to-Peer Content Sharing System}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {945--962}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/jia}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/JiaMTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LimTSC14, author = {Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee{-}Chien Chang}, title = {Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {539}, year = {2014}, url = {http://eprint.iacr.org/2014/539}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LimTSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TopleSCS13, author = {Shruti Tople and Shweta Shinde and Zhaofeng Chen and Prateek Saxena}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {{AUTOCRYPT:} enabling homomorphic computation on servers to protect sensitive web content}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1297--1310}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516666}, doi = {10.1145/2508859.2516666}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TopleSCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DongCSTSL13, author = {Xinshu Dong and Zhaofeng Chen and Hossein Siadati and Shruti Tople and Prateek Saxena and Zhenkai Liang}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Protecting sensitive web content from client-side vulnerabilities with {CRYPTONS}}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1311--1324}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516743}, doi = {10.1145/2508859.2516743}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DongCSTSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.