Membership inference attacks against machine learning models R Shokri, M Stronati, C Song, V Shmatikov 2017 IEEE symposium on security and privacy (SP), 3-18, 2017 | 5109 | 2017 |
Robust de-anonymization of large sparse datasets A Narayanan, V Shmatikov 2008 IEEE Symposium on Security and Privacy (sp 2008), 111-125, 2008 | 3503 | 2008 |
Privacy-preserving deep learning R Shokri, V Shmatikov Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 2868 | 2015 |
How to backdoor federated learning E Bagdasaryan, A Veit, Y Hua, D Estrin, V Shmatikov International conference on artificial intelligence and statistics, 2938-2948, 2020 | 2281 | 2020 |
Exploiting unintended feature leakage in collaborative learning L Melis, C Song, E De Cristofaro, V Shmatikov 2019 IEEE symposium on security and privacy (SP), 691-706, 2019 | 1847 | 2019 |
De-anonymizing social networks A Narayanan, V Shmatikov 2009 30th IEEE symposium on security and privacy, 173-187, 2009 | 1846 | 2009 |
Airavat: Security and privacy for MapReduce. I Roy, STV Setty, A Kilzer, V Shmatikov, E Witchel NSDI 10, 297-312, 2010 | 712 | 2010 |
The most dangerous code in the world: validating SSL certificates in non-browser software M Georgiev, S Iyengar, S Jana, R Anubhai, D Boneh, V Shmatikov Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 690 | 2012 |
Machine learning models that remember too much C Song, T Ristenpart, V Shmatikov Proceedings of the 2017 ACM SIGSAC Conference on computer and communications …, 2017 | 637 | 2017 |
Fast dictionary attacks on passwords using time-space tradeoff A Narayanan, V Shmatikov Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 619 | 2005 |
How to break anonymity of the netflix prize dataset A Narayanan, V Shmatikov arXiv preprint cs/0610105, 2006 | 570 | 2006 |
Differential privacy has disparate impact on model accuracy E Bagdasaryan, O Poursaeed, V Shmatikov Advances in neural information processing systems 32, 2019 | 568 | 2019 |
Myths and fallacies of" personally identifiable information" A Narayanan, V Shmatikov Communications of the ACM 53 (6), 24-26, 2010 | 533 | 2010 |
The cost of privacy: destruction of data-mining utility in anonymized data publishing J Brickell, V Shmatikov Proceedings of the 14th ACM SIGKDD international conference on Knowledge …, 2008 | 505 | 2008 |
Constraint solving for bounded-process cryptographic protocol analysis J Millen, V Shmatikov Proceedings of the 8th ACM conference on Computer and Communications …, 2001 | 486 | 2001 |
" You might also like:" Privacy risks of collaborative filtering JA Calandrino, A Kilzer, A Narayanan, EW Felten, V Shmatikov 2011 IEEE symposium on security and privacy, 231-246, 2011 | 435 | 2011 |
Timing analysis in low-latency mix networks: Attacks and defenses V Shmatikov, MH Wang Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 371 | 2006 |
Blind backdoors in deep learning models E Bagdasaryan, V Shmatikov 30th USENIX Security Symposium (USENIX Security 21), 1505-1521, 2021 | 339 | 2021 |
Salvaging federated learning by local adaptation T Yu, E Bagdasaryan, V Shmatikov arXiv preprint arXiv:2002.04758, 2020 | 310 | 2020 |
Towards practical privacy for genomic computation S Jha, L Kruger, V Shmatikov 2008 IEEE Symposium on Security and Privacy (sp 2008), 216-230, 2008 | 279 | 2008 |