Остановите войну!
for scientists:
default search action
Úlfar Erlingsson
Person information
- affiliation: Reykjavík University, Iceland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c33]Nicolas Papernot, Abhradeep Thakurta, Shuang Song, Steve Chien, Úlfar Erlingsson:
Tempered Sigmoid Activations for Deep Learning with Differential Privacy. AAAI 2021: 9312-9321 - [c32]Nicholas Carlini, Florian Tramèr, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom B. Brown, Dawn Song, Úlfar Erlingsson, Alina Oprea, Colin Raffel:
Extracting Training Data from Large Language Models. USENIX Security Symposium 2021: 2633-2650 - 2020
- [i17]Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Shuang Song, Kunal Talwar, Abhradeep Thakurta:
Encode, Shuffle, Analyze Privacy Revisited: Formalizations and Empirical Evaluation. CoRR abs/2001.03618 (2020) - [i16]Nicolas Papernot, Abhradeep Thakurta, Shuang Song, Steve Chien, Úlfar Erlingsson:
Tempered Sigmoid Activations for Deep Learning with Differential Privacy. CoRR abs/2007.14191 (2020) - [i15]Nicholas Carlini, Florian Tramèr, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom B. Brown, Dawn Song, Úlfar Erlingsson, Alina Oprea, Colin Raffel:
Extracting Training Data from Large Language Models. CoRR abs/2012.07805 (2020)
2010 – 2019
- 2019
- [c31]Sai Teja Peddinti, Igor Bilogrevic, Nina Taft, Martin Pelikan, Úlfar Erlingsson, Pauline Anthonysamy, Giles Hogben:
Reducing Permission Requests in Mobile Apps. Internet Measurement Conference 2019: 259-266 - [c30]Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Abhradeep Thakurta:
Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity. SODA 2019: 2468-2479 - [c29]Nicholas Carlini, Chang Liu, Úlfar Erlingsson, Jernej Kos, Dawn Song:
The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks. USENIX Security Symposium 2019: 267-284 - [i14]Úlfar Erlingsson, Ilya Mironov, Ananth Raghunathan, Shuang Song:
That which we call private. CoRR abs/1908.03566 (2019) - [i13]Nicholas Carlini, Úlfar Erlingsson, Nicolas Papernot:
Distribution Density, Tails, and Outliers in Machine Learning: Metrics and Applications. CoRR abs/1910.13427 (2019) - 2018
- [c28]Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson:
Scalable Private Learning with PATE. ICLR 2018 - [i12]Nicholas Carlini, Chang Liu, Jernej Kos, Úlfar Erlingsson, Dawn Song:
The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets. CoRR abs/1802.08232 (2018) - [i11]Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson:
Scalable Private Learning with PATE. CoRR abs/1802.08908 (2018) - [i10]Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Abhradeep Thakurta:
Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity. CoRR abs/1811.12469 (2018) - 2017
- [c27]Úlfar Erlingsson:
Data-driven Software Security and its Hardware Support. ASHES@CCS 2017: 3 - [c26]Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. CSF 2017: 1-6 - [c25]Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, Kunal Talwar:
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. ICLR 2017 - [c24]Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, Bernhard Seefeld:
Prochlo: Strong Privacy for Analytics in the Crowd. SOSP 2017: 441-459 - [i9]Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches. CoRR abs/1708.08022 (2017) - [i8]Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, Bernhard Seefeld:
Prochlo: Strong Privacy for Analytics in the Crowd. CoRR abs/1710.00901 (2017) - 2016
- [j8]Giulia Fanti, Vasyl Pihur, Úlfar Erlingsson:
Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries. Proc. Priv. Enhancing Technol. 2016(3): 41-61 (2016) - [c23]Úlfar Erlingsson:
Data-Driven Software Security: Models and Methods. CSF 2016: 9-15 - [i7]Úlfar Erlingsson:
Data-driven software security: Models and methods. CoRR abs/1605.08797 (2016) - [i6]Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, Kunal Talwar:
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. CoRR abs/1610.05755 (2016) - 2015
- [i5]Giulia Fanti, Vasyl Pihur, Úlfar Erlingsson:
Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries. CoRR abs/1503.01214 (2015) - [i4]Suman Jana, Úlfar Erlingsson, Iulia Ion:
Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis. CoRR abs/1510.07308 (2015) - 2014
- [c22]Úlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova:
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. CCS 2014: 1054-1067 - [c21]Arnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, Mark Lentczner:
Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. NDSS 2014 - [c20]Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff Pike:
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. USENIX Security Symposium 2014: 941-955 - [i3]Úlfar Erlingsson, Aleksandra Korolova, Vasyl Pihur:
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. CoRR abs/1407.6981 (2014) - 2013
- [c19]Bin Zeng, Gang Tan, Úlfar Erlingsson:
Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors. USENIX Security Symposium 2013: 369-382 - 2012
- [j7]Úlfar Erlingsson, Marcus Peinado, Simon Peter, Mihai Budiu, Gloria Mainar-Ruiz:
Fay: Extensible Distributed Tracing from Kernels to Clusters. ACM Trans. Comput. Syst. 30(4): 13:1-13:35 (2012) - [c18]Mike Samuel, Úlfar Erlingsson:
Let's Parse to Prevent Pwnage. LEET 2012 - 2011
- [c17]Jason Ansel, Petr Marchenko, Úlfar Erlingsson, Elijah Taylor, Brad Chen, Derek L. Schuff, David Sehr, Cliff Biffle, Bennet Yee:
Language-independent sandboxing of just-in-time compilation and self-modifying code. PLDI 2011: 355-366 - [c16]Úlfar Erlingsson, Marcus Peinado, Simon Peter, Mihai Budiu:
Fay: extensible distributed tracing from kernels to clusters. SOSP 2011: 311-326 - [c15]Ankur Taly, Úlfar Erlingsson, John C. Mitchell, Mark S. Miller, Jasvir Nagra:
Automated Analysis of Security-Critical JavaScript APIs. IEEE Symposium on Security and Privacy 2011: 363-378 - [e3]Úlfar Erlingsson, Roel J. Wieringa, Nicola Zannone:
Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings. Lecture Notes in Computer Science 6542, Springer 2011, ISBN 978-3-642-19124-4 [contents] - 2010
- [p1]Úlfar Erlingsson, Yves Younan, Frank Piessens:
Low-Level Software Security by Example. Handbook of Information and Communication Security 2010: 633-658
2000 – 2009
- 2009
- [j6]Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur. 13(1): 4:1-4:40 (2009) - [c14]Arnar Birgisson, Úlfar Erlingsson:
An implementation and semantics for transactional memory introspection in Haskell. PLAS 2009: 87-99 - [e2]Dan Boneh, Úlfar Erlingsson, Martin Johns, Benjamin Livshits:
Web Application Security, 29.03. - 03.04.2009. Dagstuhl Seminar Proceedings 09141, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2009 [contents] - [i2]Dan Boneh, Úlfar Erlingsson, Martin Johns, Benjamin Livshits:
09141 Abstracts Collection - Web Application Security. Web Application Security 2009 - [i1]Dan Boneh, Úlfar Erlingsson, Martin Johns, Benjamin Livshits:
09141 Executive Summary - Web Application Security. Web Application Security 2009 - 2008
- [j5]Marco Pistoia, Úlfar Erlingsson:
Workshop on programming languages and analysis for security (PLAS 2008). ACM SIGPLAN Notices 43(12): 3-4 (2008) - [j4]Marco Pistoia, Úlfar Erlingsson:
PLAS 2008 paper abstracts. ACM SIGPLAN Notices 43(12): 5-8 (2008) - [j3]Marco Pistoia, Úlfar Erlingsson:
Programming languages and program analysis for security: a three-year retrospective. ACM SIGPLAN Notices 43(12): 32-39 (2008) - [c13]Arnar Birgisson, Mohan Dhawan, Úlfar Erlingsson, Vinod Ganapathy, Liviu Iftode:
Enforcing authorization policies using transactional memory introspection. CCS 2008: 223-234 - [c12]Yuan Yu, Michael Isard, Dennis Fetterly, Mihai Budiu, Úlfar Erlingsson, Pradeep Kumar Gunda, Jon Currey:
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language. OSDI 2008: 1-14 - [e1]Úlfar Erlingsson, Marco Pistoia:
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PLAS 2008, Tucson, AZ, USA, June 8, 2008. ACM 2008, ISBN 978-1-59593-936-4 [contents] - 2007
- [c11]Úlfar Erlingsson:
Low-Level Software Security: Attacks and Defenses. FOSAD 2007: 92-134 - [c10]Úlfar Erlingsson, V. Benjamin Livshits, Yinglian Xie:
End-to-End Web Application Security. HotOS 2007 - [c9]V. Benjamin Livshits, Úlfar Erlingsson:
Using web application construction frameworks to protect against code injection attacks. PLAS 2007: 95-104 - 2006
- [j2]Úlfar Erlingsson, John MacCormick:
Ad hoc extensibility and access control. ACM SIGOPS Oper. Syst. Rev. 40(3): 93-101 (2006) - [c8]Mihai Budiu, Úlfar Erlingsson, Martín Abadi:
Architectural support for software-based protection. ASID 2006: 42-51 - [c7]Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula:
XFI: Software Guards for System Address Spaces. OSDI 2006: 75-88 - 2005
- [c6]Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
Control-flow integrity. CCS 2005: 340-353 - [c5]Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
A Theory of Secure Control Flow. ICFEM 2005: 111-124 - 2004
- [b1]Úlfar Erlingsson:
The Inlined Reference Monitor Approach to Security Policy Enforcement. Cornell University, USA, 2004 - 2000
- [c4]Michael Burrows, Úlfar Erlingsson, Shun-Tak Leung, Mark T. Vandevoorde, Carl A. Waldspurger, Kip Walker, William E. Weihl:
Efficient and Flexible Value Sampling. ASPLOS 2000: 160-167 - [c3]Úlfar Erlingsson, Fred B. Schneider:
IRM Enforcement of Java Stack Inspection. S&P 2000: 246-255
1990 – 1999
- 1999
- [c2]Úlfar Erlingsson, Fred B. Schneider:
SASI enforcement of security policies: a retrospective. NSPW 1999: 87-95 - 1996
- [j1]Úlfar Erlingsson, Mukkai S. Krishnamoorthy, T. V. Raman:
Efficient Multiway Radix Search Trees. Inf. Process. Lett. 60(3): 115-120 (1996) - [c1]Úlfar Erlingsson, Erich L. Kaltofen, David R. Musser:
Generic Gram-Schmidt Orthogonalization by Exact Division. ISSAC 1996: 275-282
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint