Shruti Tople
Shruti Tople
Microsoft Research
Verified email at
Cited by
Cited by
Panoply: Low-TCB Linux Applications With SGX Enclaves.
S Shinde, D Le Tien, S Tople, P Saxena
NDSS, 2017
A traceability analysis of monero’s blockchain
A Kumar, C Fischer, S Tople, P Saxena
European Symposium on Research in Computer Security, 153-173, 2017
A uror: defending against poisoning attacks in collaborative deep learning systems
S Shen, S Tople, P Saxena
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Privado: Practical and secure DNN inference
S Tople, K Grover, S Shinde, R Bhagwan, R Ramjee
arXiv preprint arXiv:1810.00602, 2018
Falcon: Honest-majority maliciously secure framework for private deep learning
S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin
Proceedings on Privacy Enhancing Technologies 2021 (1), 188-208, 2021
Domain generalization using causal matching
D Mahajan, S Tople, A Sharma
International Conference on Machine Learning, 7313-7324, 2021
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content
S Tople, S Shinde, Z Chen, P Saxena
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Analyzing information leakage of updates to natural language models
S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
On the trade-offs in oblivious execution techniques
S Tople, P Saxena
International Conference on Detection of Intrusions and Malware, and …, 2017
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Y Jia, T Moataz, S Tople, P Saxena
USENIX Security Symposium, 945-962, 2016
Podarch: Protecting legacy applications with a purely hardware tcb
S Shinde, S Tople, D Kathayat, P Saxena
National University of Singapore, Tech. Rep, 2015
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption.
HW Lim, S Tople, P Saxena, EC Chang
IACR Cryptology ePrint Archive 2014, 539, 2014
Alleviating Privacy Attacks via Causal Learning
S Tople, A Sharma, A Nori
International Conference on Machine Learning, 9537-9547, 2020
Collaborative Machine Learning Markets with Data-Replication-Robust Payments
O Ohrimenko, S Tople, S Tschiatschek
arXiv preprint arXiv:1911.09052, 2019
Leakage of Dataset Properties in Multi-Party Machine Learning
W Zhang, S Tople, O Ohrimenko
30th {USENIX} Security Symposium ({USENIX} Security 21), 2687-2704, 2021
An Empirical Study on the Intrinsic Privacy of SGD
SL Hyland, S Tople
arXiv preprint arXiv:1912.02919, 2019
Soteria: In search of efficient neural networks for private inference
A Aggarwal, TE Carlson, R Shokri, S Tople
arXiv preprint arXiv:2007.12934, 2020
PRO-ORAM: Practical Read-Only Oblivious {RAM}
S Tople, Y Jia, P Saxena
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
VeriCount: Verifiable Resource Accounting Using Hardware and Software Isolation
S Tople, S Park, MS Kang, P Saxena
International Conference on Applied Cryptography and Network Security, 657-677, 2018
The system can't perform the operation now. Try again later.
Articles 1–20