HAIL: A high-availability and integrity layer for cloud storage KD Bowers, A Juels, A Oprea Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 1425 | 2009 |
Extracting training data from large language models N Carlini, F Tramer, E Wallace, M Jagielski, A Herbert-Voss, K Lee, ... 30th USENIX Security Symposium (USENIX Security 21), 2633-2650, 2021 | 1346 | 2021 |
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li 2018 IEEE symposium on security and privacy (SP), 19-35, 2018 | 920 | 2018 |
Proofs of retrievability: Theory and implementation KD Bowers, A Juels, A Oprea Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009 | 819 | 2009 |
Homealone: Co-residency detection in the cloud via side-channel analysis Y Zhang, A Juels, A Oprea, MK Reiter 2011 IEEE symposium on security and privacy, 313-328, 2011 | 488 | 2011 |
Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks A Demontis, M Melis, M Pintor, M Jagielski, B Biggio, A Oprea, ... 28th USENIX security symposium (USENIX security 19), 321-338, 2019 | 413 | 2019 |
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda Proceedings of the 29th annual computer security applications conference …, 2013 | 398 | 2013 |
FlipIt: The Game of “Stealthy Takeover” M Van Dijk, A Juels, A Oprea, RL Rivest Journal of Cryptology 26, 655-713, 2013 | 321 | 2013 |
Detection of malicious web activity in enterprise computer networks AM Oprea, Z Li, R Norris, KD Bowers US Patent 9,838,407, 2017 | 314 | 2017 |
Iris: A scalable cloud file system with efficient integrity checks E Stefanov, M van Dijk, A Juels, A Oprea Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 246 | 2012 |
Detection of early-stage enterprise infection by mining large-scale log data A Oprea, Z Li, TF Yen, SH Chin, S Alrwais 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015 | 232 | 2015 |
New approaches to security and availability for cloud data A Juels, A Oprea Communications of the ACM 56 (2), 64-73, 2013 | 208 | 2013 |
Auditing differentially private machine learning: How private is Differentially Private SGD? M Jagielski, J Ullman, A Oprea Thirty-fourth Conference on Neural Information Processing Systems (NeurIPS) 2020, 2020 | 193* | 2020 |
Scalable cloud file system with efficient integrity checks EP Stefanov, ME Van Dijk, AM Oprea, A Juels US Patent 8,706,701, 2014 | 168 | 2014 |
Differentially private fair learning M Jagielski, M Kearns, J Mao, A Oprea, A Roth, S Sharifi-Malvajerdi, ... International Conference on Machine Learning, 3000-3008, 2019 | 166 | 2019 |
Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers G Severi, J Meyer, S Coull, A Oprea 30th USENIX Security Symposium (USENIX Security 21), 1487-1504, 2021 | 158 | 2021 |
How to tell if your cloud files are vulnerable to drive crashes KD Bowers, M Van Dijk, A Juels, A Oprea, RL Rivest Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 127 | 2011 |
Space-Efficient Block Storage Integrity. A Oprea, MK Reiter, K Yang NDSS, 2005 | 126 | 2005 |
Anomaly sensor framework for detecting advanced persistent threat attacks TF Yen, A Juels, A Kuppa, K Onarlioglu, A Oprea US Patent 9,378,361, 2016 | 124 | 2016 |
Robust linear regression against training data poisoning C Liu, B Li, Y Vorobeychik, A Oprea Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017 | 120 | 2017 |