A uror: defending against poisoning attacks in collaborative deep learning systems S Shen, S Tople, P Saxena Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 360 | 2016 |
Panoply: Low-TCB Linux Applications With SGX Enclaves. S Shinde, D Le Tien, S Tople, P Saxena NDSS, 2017 | 297 | 2017 |
Domain generalization using causal matching D Mahajan, S Tople, A Sharma International Conference on Machine Learning, 7313-7324, 2021 | 270 | 2021 |
Falcon: Honest-majority maliciously secure framework for private deep learning S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin Proceedings on Privacy Enhancing Technologies 2021 (1), 188-208, 2021 | 247 | 2021 |
A traceability analysis of monero’s blockchain A Kumar, C Fischer, S Tople, P Saxena European Symposium on Research in Computer Security, 153-173, 2017 | 239 | 2017 |
Analyzing information leakage of updates to natural language models S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 117 | 2020 |
Analyzing leakage of personally identifiable information in language models N Lukas, A Salem, R Sim, S Tople, L Wutschitz, S Zanella-Béguelin arXiv preprint arXiv:2302.00539, 2023 | 103 | 2023 |
Privado: Practical and secure DNN inference S Tople, K Grover, S Shinde, R Bhagwan, R Ramjee arXiv preprint arXiv:1810.00602, 2018 | 91* | 2018 |
Leakage of Dataset Properties in Multi-Party Machine Learning W Zhang, S Tople, O Ohrimenko 30th {USENIX} Security Symposium ({USENIX} Security 21), 2687-2704, 2021 | 85* | 2021 |
Alleviating Privacy Attacks via Causal Learning S Tople, A Sharma, A Nori International Conference on Machine Learning, 9537-9547, 2020 | 34 | 2020 |
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content S Tople, S Shinde, Z Chen, P Saxena Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 33 | 2013 |
Collaborative Machine Learning Markets with Data-Replication-Robust Payments O Ohrimenko, S Tople, S Tschiatschek arXiv preprint arXiv:1911.09052, 2019 | 32 | 2019 |
Bayesian estimation of differential privacy S Zanella-Béguelin, L Wutschitz, S Tople, A Salem, V Rühle, A Paverd, ... arXiv preprint arXiv:2206.05199, 2022 | 29 | 2022 |
On the trade-offs in oblivious execution techniques S Tople, P Saxena International Conference on Detection of Intrusions and Malware, and …, 2017 | 29 | 2017 |
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 27 | 2013 |
PRO-ORAM: Practical Read-Only Oblivious {RAM} S Tople, Y Jia, P Saxena 22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019 | 24* | 2019 |
SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning A Salem, G Cherubin, D Evans, B Köpf, A Paverd, A Suri, S Tople, ... arXiv preprint arXiv:2212.10986, 2022 | 23 | 2022 |
Grey-box Extraction of Natural Language Models S Zanella-Beguelin, S Tople, A Paverd, B Köpf International Conference on Machine Learning, 12278-12286, 2021 | 23 | 2021 |
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System. Y Jia, T Moataz, S Tople, P Saxena USENIX Security Symposium, 945-962, 2016 | 18 | 2016 |
Podarch: Protecting legacy applications with a purely hardware tcb S Shinde, S Tople, D Kathayat, P Saxena National University of Singapore, Tech. Rep, 2015 | 18 | 2015 |