Остановите войну!
for scientists:
default search action
Prateek Mittal
- > Home > Persons > Prateek Mittal
Publications
- 2022
- [c91]Vikash Sehwag, Saeed Mahloujifar, Tinashe Handina, Sihui Dai, Chong Xiang, Mung Chiang, Prateek Mittal:
Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness? ICLR 2022 - 2021
- [j25]Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal:
Securing internet applications from routing attacks. Commun. ACM 64(6): 86-96 (2021) - [c76]Vikash Sehwag, Mung Chiang, Prateek Mittal:
SSD: A Unified Framework for Self-Supervised Outlier Detection. ICLR 2021 - [c74]Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Edoardo Debenedetti, Nicolas Flammarion, Mung Chiang, Prateek Mittal, Matthias Hein:
RobustBench: a standardized adversarial robustness benchmark. NeurIPS Datasets and Benchmarks 2021 - [i75]Vikash Sehwag, Mung Chiang, Prateek Mittal:
SSD: A Unified Framework for Self-Supervised Outlier Detection. CoRR abs/2103.12051 (2021) - [i73]Vikash Sehwag, Saeed Mahloujifar, Tinashe Handina, Sihui Dai, Chong Xiang, Mung Chiang, Prateek Mittal:
Improving Adversarial Robustness Using Proxy Distributions. CoRR abs/2104.09425 (2021) - 2020
- [c69]Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal:
Detecting Malware Injection with Program-DNS Behavior. EuroS&P 2020: 552-568 - [i60]Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal:
Securing Internet Applications from Routing Attacks. CoRR abs/2004.09063 (2020) - [i57]Vikash Sehwag, Rajvardhan Oak, Mung Chiang, Prateek Mittal:
Time for a Background Check! Uncovering the impact of Background Features on Deep Neural Networks. CoRR abs/2006.14077 (2020) - [i53]Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Nicolas Flammarion, Mung Chiang, Prateek Mittal, Matthias Hein:
RobustBench: a standardized adversarial robustness benchmark. CoRR abs/2010.09670 (2020) - 2019
- [c65]Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal:
Analyzing the Robustness of Open-World Machine Learning. AISec@CCS 2019: 105-116 - [i50]Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal:
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples. CoRR abs/1905.01726 (2019) - 2018
- [j11]Arsalan Mosenia, Jad F. Bechara, Tao Zhang, Prateek Mittal, Mung Chiang:
ProCMotive: Bringing Programmability and Connectivity into Isolated Vehicles. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(1): 26:1-26:31 (2018) - [j9]Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal:
Tempest: Temporal Dynamics in Anonymity Systems. Proc. Priv. Enhancing Technol. 2018(3): 22-42 (2018) - [c55]Tsung-Yen Yang, Christopher G. Brinton, Prateek Mittal, Mung Chiang, Andrew S. Lan:
Learning Informative and Private Representations via Generative Adversarial Networks. IEEE BigData 2018: 1534-1543 - [c54]Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal:
Acoustic Denial of Service Attacks on Hard Disk Drives. ASHES@CCS 2018: 34-39 - [c52]Vikash Sehwag, Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal:
Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints. CCS 2018: 2285-2287 - [c45]Surin Ahn, Maria Gorlatova, Parinaz Naghizadeh, Mung Chiang, Prateek Mittal:
Adaptive Fog-Based Output Security for Augmented Reality. VR/AR Network@SIGCOMM 2018: 1-6 - [i43]Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal:
Tempest: Temporal Dynamics in Anonymity Systems. CoRR abs/1801.01932 (2018) - [i42]Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang:
Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos. CoRR abs/1801.02780 (2018) - [i39]Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal:
DARTS: Deceiving Autonomous Cars with Toxic Signs. CoRR abs/1802.06430 (2018) - 2017
- [c34]Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal:
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks. IEEE Symposium on Security and Privacy 2017: 977-992 - [i24]Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal:
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks. CoRR abs/1704.00843 (2017) - [i19]Arsalan Mosenia, Jad F. Bechara, Tao Zhang, Prateek Mittal, Mung Chiang:
ProCMotive: Bringing Programability and Connectivity into Isolated Vehicles. CoRR abs/1709.07450 (2017) - [i17]Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal:
Acoustic Denial of Service Attacks on HDDs. CoRR abs/1712.07816 (2017) - 2015
- [c22]Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal:
RAPTOR: Routing Attacks on Privacy in Tor. USENIX Security Symposium 2015: 271-286 - [i11]Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal:
RAPTOR: Routing Attacks on Privacy in Tor. CoRR abs/1503.03940 (2015)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-10 21:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint