Poison frogs! targeted clean-label poisoning attacks on neural networks A Shafahi, WR Huang, M Najibi, O Suciu, C Studer, T Dumitras, ... Advances in neural information processing systems 31, 2018 | 1128 | 2018 |
Before we knew it: an empirical study of zero-day attacks in the real world L Bilge, T Dumitraş Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 852 | 2012 |
Vulnerability disclosure in the age of social media: Exploiting twitter for predicting {Real-World} exploits C Sabottke, O Suciu, T Dumitraș 24th USENIX Security Symposium (USENIX Security 15), 1041-1056, 2015 | 392 | 2015 |
When does machine learning {FAIL}? generalized transferability for evasion and poisoning attacks O Suciu, R Marginean, Y Kaya, H Daume III, T Dumitras 27th USENIX Security Symposium (USENIX Security 18), 1299-1316, 2018 | 307 | 2018 |
Shallow-deep networks: Understanding and mitigating network overthinking Y Kaya, S Hong, T Dumitras International conference on machine learning, 3301-3310, 2019 | 292 | 2019 |
Towards on-chip fault-tolerant communication T Dumitraş, S Kerner, R Mărculescu Proceedings of the 2003 Asia and South Pacific Design Automation Conference …, 2003 | 213 | 2003 |
Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks S Hong, P Frigo, Y Kaya, C Giuffrida, T Dumitraș 28th USENIX Security Symposium (USENIX Security 19), 497-514, 2019 | 193 | 2019 |
The attack of the clones: A study of the impact of shared code on vulnerability patching A Nappa, R Johnson, L Bilge, J Caballero, T Dumitras 2015 IEEE symposium on security and privacy, 692-708, 2015 | 185 | 2015 |
The dropper effect: Insights into malware distribution with downloader graph analytics BJ Kwon, J Mondal, J Jang, L Bilge, T Dumitraş Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 170 | 2015 |
Analysis of SSL certificate reissues and revocations in the wake of Heartbleed L Zhang, D Choffnes, D Levin, T Dumitraş, A Mislove, A Schulman, ... Proceedings of the 2014 Conference on Internet Measurement Conference, 489-502, 2014 | 150 | 2014 |
Featuresmith: Automatically engineering features for malware detection by mining the security literature Z Zhu, T Dumitraş Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 147 | 2016 |
On-chip stochastic communication [soc applications] T Dumitras, R Marculescu 2003 Design, Automation and Test in Europe Conference and Exhibition, 790-795, 2003 | 146 | 2003 |
Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE) T Dumitras, D Shou Proceedings of the First Workshop on Building Analysis Datasets and …, 2011 | 139 | 2011 |
A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks DF Sittig, H Singh Applied clinical informatics 7 (02), 624-632, 2016 | 136 | 2016 |
On the effectiveness of mitigating data poisoning attacks with gradient shaping S Hong, V Chandrasekaran, Y Kaya, T Dumitraş, N Papernot arXiv preprint arXiv:2002.11497, 2020 | 127 | 2020 |
Why do upgrades fail and what can we do about it? Toward dependable, online upgrades in enterprise system T Dumitraş, P Narasimhan ACM/IFIP/USENIX International Conference on Distributed Systems Platforms …, 2009 | 126 | 2009 |
Chainsmith: Automatically learning the semantics of malicious campaigns by mining threat intelligence reports Z Zhu, T Dumitras 2018 IEEE European symposium on security and privacy (EuroS&P), 458-472, 2018 | 122 | 2018 |
Stochastic Communication: A New Paradigm for Fault‐Tolerant Networks‐on‐Chip P Bogdan, T Dumitraş, R Marculescu VLSI design 2007 (1), 095348, 2007 | 119 | 2007 |
Some vulnerabilities are different than others: Studying vulnerabilities and attack surfaces in the wild K Nayak, D Marino, P Efstathopoulos, T Dumitraş International Workshop on Recent Advances in Intrusion Detection, 426-446, 2014 | 114 | 2014 |
MEAD: support for Real‐Time Fault‐Tolerant CORBA P Narasimhan, TA Dumitraş, AM Paulos, SM Pertet, CF Reverte, ... Concurrency and Computation: Practice and Experience 17 (12), 1527-1545, 2005 | 94 | 2005 |