Подписаться
Somesh Jha
Somesh Jha
Lubar Chair of Computer Science, University of Wisconsin
Подтвержден адрес электронной почты в домене cs.wisc.edu
Название
Процитировано
Процитировано
Год
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
32692016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
26892017
Distillation as a defense to adversarial perturbations against deep neural networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE symposium on security and privacy (SP), 582-597, 2016
25612016
Counterexample-guided abstraction refinement
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
International Conference on Computer Aided Verification, 154-169, 2000
24242000
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
17562002
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
16982015
Counterexample-guided abstraction refinement for symbolic model checking
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Journal of the ACM (JACM) 50 (5), 752-794, 2003
11702003
Semantics-aware malware detection
M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant
2005 IEEE symposium on security and privacy (S&P'05), 32-46, 2005
10742005
Static analysis of executables to detect malicious patterns
M Christodorescu, S Jha
12th USENIX Security Symposium (USENIX Security 03), 2003
9922003
Two formal analyses of attack graphs
S Jha, O Sheyner, J Wing
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 49-63, 2002
7452002
Modular verification of software components in C
S Chaki, EM Clarke, A Groce, S Jha, H Veith
IEEE Transactions on Software Engineering 30 (6), 388-402, 2004
6742004
Privacy in pharmacogenetics: An {End-to-End} case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
23rd USENIX Security Symposium (USENIX Security 14), 17-32, 2014
6672014
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
6052007
Effective {Inter-Component} Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis
D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon
22nd USENIX Security Symposium (USENIX Security 13), 543-558, 2013
5312013
Privacy risk in machine learning: Analyzing the connection to overfitting
S Yeom, I Giacomelli, M Fredrikson, S Jha
2018 IEEE 31st computer security foundations symposium (CSF), 268-282, 2018
4792018
Testing malware detectors
M Christodorescu, S Jha
ACM SIGSOFT Software Engineering Notes 29 (4), 34-44, 2004
4602004
Practical black-box attacks against deep learning systems using adversarial examples
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
arXiv preprint arXiv:1602.02697 1 (2), 3, 2016
4322016
Global intrusion detection in the domino overlay system
V Yegneswaran, P Barford, S Jha
University of Wisconsin-Madison Department of Computer Sciences, 2003
4192003
Exploiting symmetry in temporal logic model checking
EM Clarke, R Enders, T Filkorn, S Jha
Formal methods in system design 9 (1), 77-104, 1996
4101996
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
3942006
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20