Membership inference attacks against machine learning models R Shokri, M Stronati, C Song, V Shmatikov 2017 IEEE symposium on security and privacy (SP), 3-18, 2017 | 3603 | 2017 |
Robust de-anonymization of large sparse datasets A Narayanan, V Shmatikov 2008 IEEE Symposium on Security and Privacy (sp 2008), 111-125, 2008 | 3150 | 2008 |
Privacy-preserving deep learning R Shokri, V Shmatikov Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 2356 | 2015 |
De-anonymizing social networks A Narayanan, V Shmatikov 2009 30th IEEE symposium on security and privacy, 173-187, 2009 | 1763 | 2009 |
How to backdoor federated learning E Bagdasaryan, A Veit, Y Hua, D Estrin, V Shmatikov International conference on artificial intelligence and statistics, 2938-2948, 2020 | 1544 | 2020 |
Exploiting unintended feature leakage in collaborative learning L Melis, C Song, E De Cristofaro, V Shmatikov 2019 IEEE symposium on security and privacy (SP), 691-706, 2019 | 1342 | 2019 |
Airavat: Security and privacy for MapReduce. I Roy, STV Setty, A Kilzer, V Shmatikov, E Witchel NSDI 10, 297-312, 2010 | 699 | 2010 |
The most dangerous code in the world: validating SSL certificates in non-browser software M Georgiev, S Iyengar, S Jana, R Anubhai, D Boneh, V Shmatikov Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 657 | 2012 |
Fast dictionary attacks on passwords using time-space tradeoff A Narayanan, V Shmatikov Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 569 | 2005 |
Machine learning models that remember too much C Song, T Ristenpart, V Shmatikov Proceedings of the 2017 ACM SIGSAC Conference on computer and communications …, 2017 | 511 | 2017 |
Myths and fallacies of" personally identifiable information" A Narayanan, V Shmatikov Communications of the ACM 53 (6), 24-26, 2010 | 487 | 2010 |
How to break anonymity of the netflix prize dataset A Narayanan, V Shmatikov arXiv preprint cs/0610105, 2006 | 482 | 2006 |
The cost of privacy: destruction of data-mining utility in anonymized data publishing J Brickell, V Shmatikov Proceedings of the 14th ACM SIGKDD international conference on Knowledge …, 2008 | 481 | 2008 |
Constraint solving for bounded-process cryptographic protocol analysis J Millen, V Shmatikov Proceedings of the 8th ACM conference on Computer and Communications …, 2001 | 478 | 2001 |
" You might also like:" Privacy risks of collaborative filtering JA Calandrino, A Kilzer, A Narayanan, EW Felten, V Shmatikov 2011 IEEE symposium on security and privacy, 231-246, 2011 | 401 | 2011 |
Differential privacy has disparate impact on model accuracy E Bagdasaryan, O Poursaeed, V Shmatikov Advances in neural information processing systems 32, 2019 | 393 | 2019 |
Timing analysis in low-latency mix networks: Attacks and defenses V Shmatikov, MH Wang Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 337 | 2006 |
Finite-State Analysis of SSL 3.0. JC Mitchell, V Shmatikov, U Stern USENIX Security Symposium 1, 201-216, 1998 | 273 | 1998 |
Towards practical privacy for genomic computation S Jha, L Kruger, V Shmatikov 2008 IEEE Symposium on Security and Privacy (sp 2008), 216-230, 2008 | 266 | 2008 |
Information hiding, anonymity and privacy: a modular approach D Hughes, V Shmatikov Journal of Computer security 12 (1), 3-36, 2004 | 264 | 2004 |