关注
Bijeeta Pal
Bijeeta Pal
在 cornell.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Beyond credential stuffing: Password similarity models using neural networks
B Pal, T Daniel, R Chatterjee, T Ristenpart
2019 IEEE Symposium on Security and Privacy (SP), 417-434, 2019
1162019
Protocols for checking compromised credentials
L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
882019
Sok: Authentication in augmented and virtual reality
S Stephenson, B Pal, S Fan, E Fernandes, Y Zhao, R Chatterjee
2022 IEEE Symposium on Security and Privacy (SP), 267-284, 2022
552022
Might I get pwned: A second generation compromised credential checking service
B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ...
31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022
222022
To transfer or not to transfer: Misclassification attacks against transfer learned text classifiers
B Pal, S Tople
arXiv preprint arXiv:2001.02438, 2020
92020
Pre-launch survey report of insurance awareness campaign
A Sinha, R Jaiswal, BD Pal, K Shuk
Delhi, India: National Council of Applied Economic Research 127, 2011
52011
Might I Get Pwned: A second generation password breach alerting service
B Pal, M Islam, M Sanusi, N Sullivan, L Valenta, T Whalen, C Wood, ...
USENIX Security, 2022
32022
Private outsourced translation for medical data
T Morrison, S Scheffler, B Pal, A Viand
Protecting Privacy through Homomorphic Encryption, 107-116, 2021
22021
A stochastic greedy heuristic algorithm for the orienteering problem
M Verma, M Gupta, B Pal, KK Shukla
2014 International Conference on Computer and Communication Technology …, 2014
12014
From Attack to Defense: Building Systems Secure against Breached Credentials
B Pal
Cornell University, 2022
2022
Roulette Wheel Selection based Heuristic Algorithm for the Orienteering Problem
M Verma, M Gupta, B Pal, KK Shukla
系统目前无法执行此操作,请稍后再试。
文章 1–11