Tudor Dumitras
Tudor Dumitras
Подтвержден адрес электронной почты в домене umiacs.umd.edu - Главная страница
Poison frogs! targeted clean-label poisoning attacks on neural networks
A Shafahi, WR Huang, M Najibi, O Suciu, C Studer, T Dumitras, ...
Advances in neural information processing systems 31, 2018
Before we knew it: an empirical study of zero-day attacks in the real world
L Bilge, T Dumitraş
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Vulnerability disclosure in the age of social media: Exploiting twitter for predicting {Real-World} exploits
C Sabottke, O Suciu, T Dumitraș
24th USENIX Security Symposium (USENIX Security 15), 1041-1056, 2015
When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks
O Suciu, R Marginean, Y Kaya, H Daume III, T Dumitras
27th USENIX Security Symposium (USENIX Security 18), 1299-1316, 2018
Shallow-deep networks: Understanding and mitigating network overthinking
Y Kaya, S Hong, T Dumitras
International conference on machine learning, 3301-3310, 2019
Towards on-chip fault-tolerant communication
T Dumitraş, S Kerner, R Mărculescu
Proceedings of the 2003 Asia and South Pacific Design Automation Conference …, 2003
The attack of the clones: A study of the impact of shared code on vulnerability patching
A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras
2015 IEEE symposium on security and privacy, 692-708, 2015
Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks
S Hong, P Frigo, Y Kaya, C Giuffrida, T Dumitraș
28th USENIX Security Symposium (USENIX Security 19), 497-514, 2019
The dropper effect: Insights into malware distribution with downloader graph analytics
BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitraş
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
On-chip stochastic communication [soc applications]
T Dumitras, R Marculescu
2003 Design, Automation and Test in Europe Conference and Exhibition, 790-795, 2003
Analysis of SSL certificate reissues and revocations in the wake of Heartbleed
L Zhang, D Choffnes, D Levin, T Dumitraş, A Mislove, A Schulman, ...
Proceedings of the 2014 Conference on Internet Measurement Conference, 489-502, 2014
Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE)
T Dumitras, D Shou
Proceedings of the First Workshop on Building Analysis Datasets and …, 2011
Featuresmith: Automatically engineering features for malware detection by mining the security literature
Z Zhu, T Dumitraş
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Why do upgrades fail and what can we do about it? Toward dependable, online upgrades in enterprise system
T Dumitraş, P Narasimhan
ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2009
Stochastic communication: A new paradigm for fault-tolerant networks-on-chip
P Bogdan, T Dumitraş, R Marculescu
VLSI design 2007, 2007
Some vulnerabilities are different than others: Studying vulnerabilities and attack surfaces in the wild
K Nayak, D Marino, P Efstathopoulos, T Dumitraş
International Workshop on Recent Advances in Intrusion Detection, 426-446, 2014
Chainsmith: Automatically learning the semantics of malicious campaigns by mining threat intelligence reports
Z Zhu, T Dumitras
2018 IEEE European symposium on security and privacy (EuroS&P), 458-472, 2018
MEAD: support for Real‐Time Fault‐Tolerant CORBA
P Narasimhan, TA Dumitraş, AM Paulos, SM Pertet, CF Reverte, ...
Concurrency and Computation: Practice and Experience 17 (12), 1527-1545, 2005
On the effectiveness of mitigating data poisoning attacks with gradient shaping
S Hong, V Chandrasekaran, Y Kaya, T Dumitraş, N Papernot
arXiv preprint arXiv:2002.11497, 2020
Certified malware: Measuring breaches of trust in the windows code-signing pki
D Kim, BJ Kwon, T Dumitraş
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20