default search action
Prateek Mittal
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Yicheng Liao, Yufei Li, Minjie Chen, Lars Nordström, Xiongfei Wang, Prateek Mittal, H. Vincent Poor:
Neural Network Design for Impedance Modeling of Power Electronic Systems Based on Latent Features. IEEE Trans. Neural Networks Learn. Syst. 35(5): 5968-5980 (2024) - [c119]Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Peter Henderson, Mengdi Wang, Prateek Mittal:
Visual Adversarial Examples Jailbreak Aligned Large Language Models. AAAI 2024: 21527-21536 - [c118]Jiachen T. Wang, Prateek Mittal, Ruoxi Jia:
Efficient Data Shapley for Weighted Nearest Neighbor Algorithms. AISTATS 2024: 2557-2565 - [c117]Lei Gao, Giorgos Christopoulos, Prateek Mittal, Ryuji Hirayama, Sriram Subramanian:
StableLev: Data-Driven Stability Enhancement for Multi-Particle Acoustic Levitation. CHI 2024: 202:1-202:11 - [c116]Josue Ortega Caro, Antonio Henrique de Oliveira Fonseca, Syed Asad Rizvi, Matteo Rosati, Christopher L. Averill, James Cross, Prateek Mittal, Emanuele Zappala, Rahul Madhav Dhodapkar, Chadi Abdallah, David van Dijk:
BrainLM: A foundation model for brain activity recordings. ICLR 2024 - [c115]Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal:
Teach LLMs to Phish: Stealing Private Information from Language Models. ICLR 2024 - [c114]Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson:
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To! ICLR 2024 - [c113]Tong Wu, Ashwinee Panda, Jiachen T. Wang, Prateek Mittal:
Privacy-Preserving In-Context Learning for Large Language Models. ICLR 2024 - [c112]Tinghao Xie, Xiangyu Qi, Ping He, Yiming Li, Jiachen T. Wang, Prateek Mittal:
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection. ICLR 2024 - [c111]Ashwinee Panda, Xinyu Tang, Saeed Mahloujifar, Vikash Sehwag, Prateek Mittal:
A New Linear Scaling Rule for Private Adaptive Hyperparameter Optimization. ICML 2024 - [c110]Boyi Wei, Kaixuan Huang, Yangsibo Huang, Tinghao Xie, Xiangyu Qi, Mengzhou Xia, Prateek Mittal, Mengdi Wang, Peter Henderson:
Assessing the Brittleness of Safety Alignment via Pruning and Low-Rank Modifications. ICML 2024 - [c109]Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal:
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses. USENIX Security Symposium 2024 - [i120]Xinyu Tang, Ashwinee Panda, Milad Nasr, Saeed Mahloujifar, Prateek Mittal:
Private Fine-tuning of Large Language Models with Zeroth-order Optimization. CoRR abs/2401.04343 (2024) - [i119]Jiachen T. Wang, Prateek Mittal, Ruoxi Jia:
Efficient Data Shapley for Weighted Nearest Neighbor Algorithms. CoRR abs/2401.11103 (2024) - [i118]Boyi Wei, Kaixuan Huang, Yangsibo Huang, Tinghao Xie, Xiangyu Qi, Mengzhou Xia, Prateek Mittal, Mengdi Wang, Peter Henderson:
Assessing the Brittleness of Safety Alignment via Pruning and Low-Rank Modifications. CoRR abs/2402.05162 (2024) - [i117]Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal:
Teach LLMs to Phish: Stealing Private Information from Language Models. CoRR abs/2403.00871 (2024) - [i116]Sihui Dai, Chong Xiang, Tong Wu, Prateek Mittal:
Position Paper: Beyond Robustness Against Single Attack Types. CoRR abs/2405.01349 (2024) - [i115]Chong Xiang, Tong Wu, Zexuan Zhong, David A. Wagner, Danqi Chen, Prateek Mittal:
Certifiably Robust RAG against Retrieval Corruption. CoRR abs/2405.15556 (2024) - [i114]Xiangyu Qi, Yangsibo Huang, Yi Zeng, Edoardo Debenedetti, Jonas Geiping, Luxi He, Kaixuan Huang, Udari Madhushani, Vikash Sehwag, Weijia Shi, Boyi Wei, Tinghao Xie, Danqi Chen, Pin-Yu Chen, Jeffrey Ding, Ruoxi Jia, Jiaqi Ma, Arvind Narayanan, Weijie J. Su, Mengdi Wang, Chaowei Xiao, Bo Li, Dawn Song, Peter Henderson, Prateek Mittal:
AI Risk Management Should Incorporate Both Safety and Security. CoRR abs/2405.19524 (2024) - [i113]Xiangyu Qi, Ashwinee Panda, Kaifeng Lyu, Xiao Ma, Subhrajit Roy, Ahmad Beirami, Prateek Mittal, Peter Henderson:
Safety Alignment Should Be Made More Than Just a Few Tokens Deep. CoRR abs/2406.05946 (2024) - [i112]Jiachen T. Wang, Prateek Mittal, Dawn Song, Ruoxi Jia:
Data Shapley in One Training Run. CoRR abs/2406.11011 (2024) - [i111]Tinghao Xie, Xiangyu Qi, Yi Zeng, Yangsibo Huang, Udari Madhushani Sehwag, Kaixuan Huang, Luxi He, Boyi Wei, Dacheng Li, Ying Sheng, Ruoxi Jia, Bo Li, Kai Li, Danqi Chen, Peter Henderson, Prateek Mittal:
SORRY-Bench: Systematically Evaluating Large Language Model Safety Refusal Behaviors. CoRR abs/2406.14598 (2024) - [i110]Vineet Jagadeesan Nair, Venkatesh Venkataramanan, Priyank Srivastava, Partha S. Sarker, Anurag Srivastava, Laurentiu D. Marinovici, Jun Zha, Christopher Irwin, Prateek Mittal, John Williams, H. Vincent Poor, Anuradha M. Annaswamy:
Resilience of the Electric Grid through Trustable IoT-Coordinated Assets. CoRR abs/2406.14861 (2024) - [i109]Ashwinee Panda, Berivan Isik, Xiangyu Qi, Sanmi Koyejo, Tsachy Weissman, Prateek Mittal:
Lottery Ticket Adaptation: Mitigating Destructive Interference in LLMs. CoRR abs/2406.16797 (2024) - [i108]Tong Wu, Shujian Zhang, Kaiqiang Song, Silei Xu, Sanqiang Zhao, Ravi Agrawal, Sathish Reddy Indurthi, Chong Xiang, Prateek Mittal, Wenxuan Zhou:
Instructional Segment Embedding: Improving LLM Safety with Instruction Hierarchy. CoRR abs/2410.09102 (2024) - [i107]Prateek Mittal, Jai Dalmotra, Joohi Chauhan:
Adaptive and Stratified Subsampling Techniques for High Dimensional Non-Standard Data Environments. CoRR abs/2410.12367 (2024) - 2023
- [j32]NagaSree Keerthi Pujari, Srinivas Soumitri Miriyala, Prateek Mittal, Kishalay Mitra:
Better wind forecasting using Evolutionary Neural Architecture search driven Green Deep Learning. Expert Syst. Appl. 214: 119063 (2023) - [j31]Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford:
RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks. Proc. Priv. Enhancing Technol. 2023(3): 194-210 (2023) - [c108]Xiangyu Qi, Tinghao Xie, Yiming Li, Saeed Mahloujifar, Prateek Mittal:
Revisiting the Assumption of Latent Separability for Backdoor Defenses. ICLR 2023 - [c107]Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal:
MultiRobustBench: Benchmarking Robustness Against Multiple Attacks. ICML 2023: 6760-6785 - [c106]Milad Nasr, Saeed Mahloujifar, Xinyu Tang, Prateek Mittal, Amir Houmansadr:
Effectively Using Public Data in Privacy Preserving Machine Learning. ICML 2023: 25718-25732 - [c105]Tong Wu, Feiran Jia, Xiangyu Qi, Jiachen T. Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal:
Uncovering Adversarial Risks of Test-Time Adaptation. ICML 2023: 37456-37495 - [c104]Jacob Alexander Markson Brown, Xi Jiang, Van Hong Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran:
Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning. KDD 2023: 3750-3761 - [c103]Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Heather Zheng, Ben Zhao, Prateek Mittal:
Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker. NeurIPS 2023 - [c102]Xinyu Tang, Ashwinee Panda, Vikash Sehwag, Prateek Mittal:
Differentially Private Image Classification by Learning Priors from Random Processes. NeurIPS 2023 - [c101]Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal:
A Privacy-Friendly Approach to Data Valuation. NeurIPS 2023 - [c100]Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal:
A Randomized Approach to Tight Privacy Accounting. NeurIPS 2023 - [c99]Edoardo Debenedetti, Vikash Sehwag, Prateek Mittal:
A Light Recipe to Train Robust Vision Transformers. SaTML 2023: 225-253 - [c98]Chong Xiang, Alexander Valtchanov, Saeed Mahloujifar, Prateek Mittal:
ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking. SP 2023: 1329-1347 - [c97]Xiangyu Qi, Tinghao Xie, Jiachen T. Wang, Tong Wu, Saeed Mahloujifar, Prateek Mittal:
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples. USENIX Security Symposium 2023: 1685-1702 - [c96]Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal:
How Effective is Multiple-Vantage-Point Domain Control Validation? USENIX Security Symposium 2023: 5701-5718 - [i106]Tong Wu, Feiran Jia, Xiangyu Qi, Jiachen T. Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal:
Uncovering Adversarial Risks of Test-Time Adaptation. CoRR abs/2301.12576 (2023) - [i105]Jacob Alexander Markson Brown, Xi Jiang, Van Hong Tran, Arjun Nitin Bhagoji, Nguyen Phong Hoang, Nick Feamster, Prateek Mittal, Vinod Yegneswaran:
Augmenting Rule-based DNS Censorship Detection at Scale with Machine Learning. CoRR abs/2302.02031 (2023) - [i104]Grace H. Cimaszewski, Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal:
How Effective is Multiple-Vantage-Point Domain Control Validation? CoRR abs/2302.08000 (2023) - [i103]Sihui Dai, Wenxin Ding, Arjun Nitin Bhagoji, Daniel Cullina, Ben Y. Zhao, Haitao Zheng, Prateek Mittal:
Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker. CoRR abs/2302.10722 (2023) - [i102]Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal:
MultiRobustBench: Benchmarking Robustness Against Multiple Attacks. CoRR abs/2302.10980 (2023) - [i101]Watson Jia, Mona Wang, Liang Wang, Prateek Mittal:
QUICstep: Circumventing QUIC-based Censorship. CoRR abs/2304.01073 (2023) - [i100]Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal:
A Randomized Approach for Tight Privacy Accounting. CoRR abs/2304.07927 (2023) - [i99]Ashwinee Panda, Tong Wu, Jiachen T. Wang, Prateek Mittal:
Differentially Private In-Context Learning. CoRR abs/2305.01639 (2023) - [i98]Xinyu Tang, Ashwinee Panda, Vikash Sehwag, Prateek Mittal:
Differentially Private Image Classification by Learning Priors from Random Processes. CoRR abs/2306.06076 (2023) - [i97]Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Mengdi Wang, Prateek Mittal:
Visual Adversarial Examples Jailbreak Large Language Models. CoRR abs/2306.13213 (2023) - [i96]Pengcheng Fang, Peng Gao, Yun Peng, Qingzhao Zhang, Tao Xie, Dawn Song, Prateek Mittal, Sanjeev R. Kulkarni, Zhuotao Liu, Xusheng Xiao:
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts. CoRR abs/2307.08912 (2023) - [i95]Tinghao Xie, Xiangyu Qi, Ping He, Yiming Li, Jiachen T. Wang, Prateek Mittal:
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection. CoRR abs/2308.12439 (2023) - [i94]Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal:
Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation. CoRR abs/2308.15709 (2023) - [i93]Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson:
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To! CoRR abs/2310.03693 (2023) - [i92]Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal:
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses. CoRR abs/2310.13076 (2023) - 2022
- [j30]Liang Wang, Prateek Mittal, Jennifer Rexford:
Data-plane security applications in adversarial settings. Comput. Commun. Rev. 52(2): 2-9 (2022) - [j29]David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal:
Athena: Probabilistic Verification of Machine Unlearning. Proc. Priv. Enhancing Technol. 2022(3): 268-290 (2022) - [j28]Mona Wang, Anunay Kulshrestha, Liang Wang, Prateek Mittal:
Leveraging strategic connection migration-powered traffic splitting for privacy. Proc. Priv. Enhancing Technol. 2022(3): 498-515 (2022) - [j27]Xinyu Tang, Milad Nasr, Saeed Mahloujifar, Virat Shejwalkar, Liwei Song, Amir Houmansadr, Prateek Mittal:
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks. Proc. Priv. Enhancing Technol. 2022(4): 332-350 (2022) - [c95]Yushan Liu, Xiaokui Shu, Yixin Sun, Jiyong Jang, Prateek Mittal:
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery. ACSAC 2022: 827-840 - [c94]Ashwinee Panda, Saeed Mahloujifar, Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal:
SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification. AISTATS 2022: 7587-7624 - [c93]Tong Wu, Tianhao Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal:
Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation. AISec@CCS 2022: 91-102 - [c92]Anna Harbluk Lorimer, Nick Feamster, Prateek Mittal:
Poster: Investigating QUIC's Potential Impact on Censorship Circumvention. CCS 2022: 3403-3405 - [c91]Vikash Sehwag, Saeed Mahloujifar, Tinashe Handina, Sihui Dai, Chong Xiang, Mung Chiang, Prateek Mittal:
Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness? ICLR 2022 - [c90]Zhengming Zhang, Ashwinee Panda, Linyue Song, Yaoqing Yang, Michael W. Mahoney, Prateek Mittal, Kannan Ramchandran, Joseph Gonzalez:
Neurotoxin: Durable Backdoors in Federated Learning. ICML 2022: 26429-26446 - [c89]Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig:
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure. NDSS 2022 - [c88]Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Heather Zheng, Prateek Mittal:
Understanding Robust Learning through the Lens of Representation Similarities. NeurIPS 2022 - [c87]Sihui Dai, Saeed Mahloujifar, Prateek Mittal:
Formulating Robustness Against Unforeseen Attacks. NeurIPS 2022 - [c86]Jiachen T. Wang, Saeed Mahloujifar, Shouda Wang, Ruoxi Jia, Prateek Mittal:
Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning. NeurIPS 2022 - [c85]Sihui Dai, Saeed Mahloujifar, Prateek Mittal:
Parameterizing Activation Functions for Adversarial Robustness. SP (Workshops) 2022: 80-87 - [c84]Jean-Pierre Smith, Luca Dolfi, Prateek Mittal, Adrian Perrig:
QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework. USENIX Security Symposium 2022: 771-789 - [c83]Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal:
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. USENIX Security Symposium 2022: 1433-1450 - [c82]Chong Xiang, Saeed Mahloujifar, Prateek Mittal:
PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier. USENIX Security Symposium 2022: 2065-2082 - [c81]Henry Birge-Lee, Joel Wanner, Grace H. Cimaszewski, Jonghoon Kwon, Liang Wang, François Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun:
Creating a Secure Underlay for the Internet. USENIX Security Symposium 2022: 2601-2618 - [i91]Chong Xiang, Alexander Valtchanov, Saeed Mahloujifar, Prateek Mittal:
ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking. CoRR abs/2202.01811 (2022) - [i90]Ryan Amos, Roland Maio, Prateek Mittal:
Reviews in motion: a large scale, longitudinal study of review recommendations on Yelp. CoRR abs/2202.09005 (2022) - [i89]Jordan Holland, Paul Schmitt, Prateek Mittal, Nick Feamster:
Towards Reproducible Network Traffic Analysis. CoRR abs/2203.12410 (2022) - [i88]Sihui Dai, Saeed Mahloujifar, Prateek Mittal:
Formulating Robustness Against Unforeseen Attacks. CoRR abs/2204.13779 (2022) - [i87]Mona Wang, Anunay Kulshrestha, Liang Wang, Prateek Mittal:
Leveraging strategic connection migration-powered traffic splitting for privacy. CoRR abs/2205.03326 (2022) - [i86]Xiangyu Qi, Tinghao Xie, Saeed Mahloujifar, Prateek Mittal:
Circumventing Backdoor Defenses That Are Based on Latent Separability. CoRR abs/2205.13613 (2022) - [i85]Xiangyu Qi, Tinghao Xie, Saeed Mahloujifar, Prateek Mittal:
Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations. CoRR abs/2205.13616 (2022) - [i84]Henry Birge-Lee, Joel Wanner, Grace H. Cimaszewski, Jonghoon Kwon, Liang Wang, François Wirz, Prateek Mittal, Adrian Perrig, Yixin Sun:
Creating a Secure Underlay for the Internet. CoRR abs/2206.06879 (2022) - [i83]Christian Cianfarani, Arjun Nitin Bhagoji, Vikash Sehwag, Ben Y. Zhao, Prateek Mittal:
Understanding Robust Learning through the Lens of Representation Similarities. CoRR abs/2206.09868 (2022) - [i82]Zhengming Zhang, Ashwinee Panda, Linyue Song, Yaoqing Yang, Michael W. Mahoney, Joseph E. Gonzalez, Kannan Ramchandran, Prateek Mittal:
Neurotoxin: Durable Backdoors in Federated Learning. CoRR abs/2206.10341 (2022) - [i81]Tong Wu, Tianhao Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal:
Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation. CoRR abs/2207.10825 (2022) - [i80]Edoardo Debenedetti, Vikash Sehwag, Prateek Mittal:
A Light Recipe to Train Robust Vision Transformers. CoRR abs/2209.07399 (2022) - [i79]Jiachen T. Wang, Saeed Mahloujifar, Shouda Wang, Ruoxi Jia, Prateek Mittal:
Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning. CoRR abs/2209.07716 (2022) - [i78]Ashwinee Panda, Xinyu Tang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal:
DP-RAFT: A Differentially Private Recipe for Accelerated Fine-Tuning. CoRR abs/2212.04486 (2022) - 2021
- [j26]Sameer Wagh, Xi He, Ashwin Machanavajjhala, Prateek Mittal:
DP-cryptography: marrying differential privacy and cryptography in emerging applications. Commun. ACM 64(2): 84-93 (2021) - [j25]Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal:
Securing internet applications from routing attacks. Commun. ACM 64(6): 86-96 (2021) - [j24]Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista A. Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaïd Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konecný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Hang Qi, Daniel Ramage, Ramesh Raskar, Mariana Raykova, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, Sen Zhao:
Advances and Open Problems in Federated Learning. Found. Trends Mach. Learn. 14(1-2): 1-210 (2021) - [j23]Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin:
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning. Proc. Priv. Enhancing Technol. 2021(1): 188-208 (2021) - [j22]Jean-Pierre Smith, Prateek Mittal, Adrian Perrig:
Website Fingerprinting in the Age of QUIC. Proc. Priv. Enhancing Technol. 2021(2): 48-69 (2021) - [j21]Anatoly Shusterman, Zohar Avraham, Eliezer Croitoru, Yarden Haskal, Lachlan Kang, Dvir Levi, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality. IEEE Trans. Dependable Secur. Comput. 18(5): 2042-2060 (2021) - [c80]Chong Xiang, Prateek Mittal:
DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks. CCS 2021: 3177-3196 - [c79]Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal:
New Directions in Automated Traffic Analysis. CCS 2021: 3366-3383 - [c78]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. ICDE 2021: 193-204 - [c77]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. ICDE 2021: 2705-2708 - [c76]Vikash Sehwag, Mung Chiang, Prateek Mittal:
SSD: A Unified Framework for Self-Supervised Outlier Detection. ICLR 2021 - [c75]Arjun Nitin Bhagoji, Daniel Cullina, Vikash Sehwag, Prateek Mittal:
Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries. ICML 2021: 863-873 - [c74]Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Edoardo Debenedetti, Nicolas Flammarion, Mung Chiang, Prateek Mittal, Matthias Hein:
RobustBench: a standardized adversarial robustness benchmark. NeurIPS Datasets and Benchmarks 2021 - [c73]Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal:
PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking. USENIX Security Symposium 2021: 2237-2254 - [c72]Liwei Song, Prateek Mittal:
Systematic Evaluation of Privacy Risks of Machine Learning Models. USENIX Security Symposium 2021: 2615-2632 - [c71]Henry Birge-Lee, Liang Wang, Daniel McCarney, Roland Shoemaker, Jennifer Rexford, Prateek Mittal:
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt. USENIX Security Symposium 2021: 4311-4327 - [i77]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. CoRR abs/2101.06761 (2021) - [i76]Chong Xiang, Prateek Mittal:
DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks. CoRR abs/2102.02956 (2021) - [i75]Vikash Sehwag, Mung Chiang, Prateek Mittal:
SSD: A Unified Framework for Self-Supervised Outlier Detection. CoRR abs/2103.12051 (2021) - [i74]Arjun Nitin Bhagoji, Daniel Cullina, Vikash Sehwag, Prateek Mittal:
Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries. CoRR abs/2104.08382 (2021) - [i73]Vikash Sehwag, Saeed Mahloujifar, Tinashe Handina, Sihui Dai, Chong Xiang, Mung Chiang, Prateek Mittal:
Improving Adversarial Robustness Using Proxy Distributions. CoRR abs/2104.09425 (2021) - [i72]Chong Xiang, Prateek Mittal:
PatchGuard++: Efficient Provable Attack Detection against Adversarial Patches. CoRR abs/2104.12609 (2021) - [i71]Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig:
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure. CoRR abs/2108.08581 (2021) - [i70]Chong Xiang, Saeed Mahloujifar, Prateek Mittal:
PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier. CoRR abs/2108.09135 (2021) - [i69]Sihui Dai, Saeed Mahloujifar, Prateek Mittal:
Parameterizing Activation Functions for Adversarial Robustness. CoRR abs/2110.05626 (2021) - [i68]Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal:
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture. CoRR abs/2110.08324 (2021) - [i67]Liang Wang, Prateek Mittal, Jennifer Rexford:
Data-Plane Security Applications in Adversarial Settings. CoRR abs/2111.02268 (2021) - [i66]Ashwinee Panda, Saeed Mahloujifar, Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal:
SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification. CoRR abs/2112.06274 (2021) - 2020
- [j20]Saurabh Bagchi, Vaneet Aggarwal, Somali Chaterji, Fred Douglis, Aly El Gamal, Jiawei Han, Brian J. Henz, Henry Hoffmann, Suman Jana, Milind Kulkarni, Felix Xiaozhu Lin, Karen B. Marais, Prateek Mittal, Shaoshuai Mou, Xiaokang Qiu, Gesualdo Scutari:
Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures. IEEE Open J. Comput. Soc. 1: 155-172 (2020) - [j19]Saleh Soltan, Prateek Mittal, H. Vincent Poor:
Protecting the Grid Against MAD Attacks. IEEE Trans. Netw. Sci. Eng. 7(3): 1310-1326 (2020) - [c70]Florentin Rochet, Ryan Wails, Aaron Johnson, Prateek Mittal, Olivier Pereira:
CLAPS: Client-Location-Aware Path Selection in Tor. CCS 2020: 17-34 - [c69]Yixin Sun, Kangkook Jee, Suphannee Sivakorn, Zhichun Li, Cristian Lumezanu, Lauri Korts-Pärn, Zhenyu Wu, Junghwan Rhee, Chung Hwan Kim, Mung Chiang, Prateek Mittal:
Detecting Malware Injection with Program-DNS Behavior. EuroS&P 2020: 552-568 - [c68]Peng Gao, Xusheng Xiao, Ding Li, Kangkook Jee, Haifeng Chen, Sanjeev R. Kulkarni, Prateek Mittal:
Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection. ICDE 2020: 1774-1777 - [c67]Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana:
HYDRA: Pruning Adversarially Robust Neural Networks. NeurIPS 2020 - [c66]Daniel Cullina, Negar Kiyavash, Prateek Mittal, H. Vincent Poor:
Partial Recovery of Erdős-Rényi Graph Alignment via k-Core Alignment. SIGMETRICS (Abstracts) 2020: 99-100 - [i65]Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana:
On Pruning Adversarially Robust Neural Networks. CoRR abs/2002.10509 (2020) - [i64]David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal:
Towards Probabilistic Verification of Machine Unlearning. CoRR abs/2003.04247 (2020) - [i63]Liwei Song, Prateek Mittal:
Systematic Evaluation of Privacy Risks of Machine Learning Models. CoRR abs/2003.10595 (2020) - [i62]Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, Tal Rabin:
FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. CoRR abs/2004.02229 (2020) - [i61]Sameer Wagh, Xi He, Ashwin Machanavajjhala, Prateek Mittal:
DP-Cryptography: Marrying Differential Privacy and Cryptography in Emerging Applications. CoRR abs/2004.08887 (2020) - [i60]Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal:
Securing Internet Applications from Routing Attacks. CoRR abs/2004.09063 (2020) - [i59]Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal:
PatchGuard: Provable Defense against Adversarial Patches Using Masks on Small Receptive Fields. CoRR abs/2005.10884 (2020) - [i58]Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford:
Programmable In-Network Obfuscation of Traffic. CoRR abs/2006.00097 (2020) - [i57]Vikash Sehwag, Rajvardhan Oak, Mung Chiang, Prateek Mittal:
Time for a Background Check! Uncovering the impact of Background Features on Deep Neural Networks. CoRR abs/2006.14077 (2020) - [i56]Liwei Song, Vikash Sehwag, Arjun Nitin Bhagoji, Prateek Mittal:
A Critical Evaluation of Open-World Machine Learning. CoRR abs/2007.04391 (2020) - [i55]Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal:
nPrint: A Standard Data Representation for Network Traffic Analysis. CoRR abs/2008.02695 (2020) - [i54]Kyle MacMillan, Jordan Holland, Prateek Mittal:
Evaluating Snowflake as an Indistinguishable Censorship Circumvention Tool. CoRR abs/2008.03254 (2020) - [i53]Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Nicolas Flammarion, Mung Chiang, Prateek Mittal, Matthias Hein:
RobustBench: a standardized adversarial robustness benchmark. CoRR abs/2010.09670 (2020) - [i52]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. CoRR abs/2010.13637 (2020)
2010 – 2019
- 2019
- [j18]Daniel Cullina, Negar Kiyavash, Prateek Mittal, H. Vincent Poor:
Partial Recovery of Erdðs-Rényi Graph Alignment via k-Core Alignment. Proc. ACM Meas. Anal. Comput. Syst. 3(3): 54:1-54:21 (2019) - [j17]Thee Chanyaswad, Changchang Liu, Prateek Mittal:
RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release. Proc. Priv. Enhancing Technol. 2019(1): 26-46 (2019) - [j16]Hans Hanley, Yixin Sun, Sameer Wagh, Prateek Mittal:
DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor. Proc. Priv. Enhancing Technol. 2019(2): 166-186 (2019) - [j15]Changchang Liu, Xi He, Thee Chanyaswad, Shiqiang Wang, Prateek Mittal:
Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing. Proc. Priv. Enhancing Technol. 2019(3): 233-254 (2019) - [j14]Gerry Wan, Aaron Johnson, Ryan Wails, Sameer Wagh, Prateek Mittal:
Guard Placement Attacks on Path Selection Algorithms for Tor. Proc. Priv. Enhancing Technol. 2019(4): 272-291 (2019) - [j13]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security. Proc. VLDB Endow. 12(12): 1802-1805 (2019) - [j12]Shouling Ji, Ting Wang, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah:
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. IEEE Trans. Dependable Secur. Comput. 16(4): 594-607 (2019) - [c65]Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal:
Analyzing the Robustness of Open-World Machine Learning. AISec@CCS 2019: 105-116 - [c64]Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan:
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices. CCS 2019: 131-147 - [c63]Liwei Song, Reza Shokri, Prateek Mittal:
Privacy Risks of Securing Machine Learning Models against Adversarial Examples. CCS 2019: 241-257 - [c62]Henry Birge-Lee, Liang Wang, Jennifer Rexford, Prateek Mittal:
SICO: Surgical Interception Attacks by Manipulating BGP Communities. CCS 2019: 431-448 - [c61]Prateek Mittal, Kishalay Mitra:
Variable Grid Resolution based Evolutionary Multi-objective optimization towards Micro-siting. CEC 2019: 2787-2793 - [c60]Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin B. Calo:
Analyzing Federated Learning through an Adversarial Lens. ICML 2019: 634-643 - [c59]Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal:
Lower Bounds on Adversarial Robustness from Optimal Transport. NeurIPS 2019: 7496-7508 - [c58]Liwei Song, Reza Shokri, Prateek Mittal:
Membership Inference Attacks Against Adversarially Robust Deep Learning Models. IEEE Symposium on Security and Privacy Workshops 2019: 50-56 - [c57]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. USENIX Security Symposium 2019: 639-656 - [c56]Yan Shvartzshnaider, Zvonimir Pavlinovic, Ananth Balashankar, Thomas Wies, Lakshminarayanan Subramanian, Helen Nissenbaum, Prateek Mittal:
VACCINE: Using Contextual Integrity For Data Leakage Detection. WWW 2019: 1702-1712 - [p1]Prateek Mittal, Affan Malik, Itishree Mohanty, Kishalay Mitra:
Comparative Study of Multi/Many-Objective Evolutionary Algorithms on Hot Rolling Application. Optimization in Industry 2019: 331-349 - [d1]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltzer, Prateek Mittal, Yossi Oren, Yuval Yarom:
Website Fingerprinting - Last Level Cache Contention Traces. IEEE DataPort, 2019 - [i51]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security. CoRR abs/1903.08159 (2019) - [i50]Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal:
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples. CoRR abs/1905.01726 (2019) - [i49]Liwei Song, Reza Shokri, Prateek Mittal:
Privacy Risks of Securing Machine Learning Models against Adversarial Examples. CoRR abs/1905.10291 (2019) - [i48]Vikash Sehwag, Shiqi Wang, Prateek Mittal, Suman Jana:
Towards Compact and Robust Deep Neural Networks. CoRR abs/1906.06110 (2019) - [i47]Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal:
Lower Bounds on Adversarial Robustness from Optimal Transport. CoRR abs/1909.12272 (2019) - [i46]Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista A. Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaïd Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konecný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Mariana Raykova, Hang Qi, Daniel Ramage, Ramesh Raskar, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, Sen Zhao:
Advances and Open Problems in Federated Learning. CoRR abs/1912.04977 (2019) - [i45]Saurabh Bagchi, Vaneet Aggarwal, Somali Chaterji, Fred Douglis, Aly El Gamal, Jiawei Han, Brian J. Henz, Hank Hoffmann, Suman Jana, Milind Kulkarni, Felix Xiaozhu Lin, Karen B. Marais, Prateek Mittal, Shaoshuai Mou, Xiaokang Qiu, Gesualdo Scutari:
Grand Challenges of Resilience: Autonomous System Resilience through Design and Runtime Measures. CoRR abs/1912.11598 (2019) - 2018
- [j11]Arsalan Mosenia, Jad F. Bechara, Tao Zhang, Prateek Mittal, Mung Chiang:
ProCMotive: Bringing Programmability and Connectivity into Isolated Vehicles. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(1): 26:1-26:31 (2018) - [j10]Michael Freyberger, Warren He, Devdatta Akhawe, Michelle L. Mazurek, Prateek Mittal:
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers. Proc. Priv. Enhancing Technol. 2018(2): 47-63 (2018) - [j9]Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal:
Tempest: Temporal Dynamics in Anonymity Systems. Proc. Priv. Enhancing Technol. 2018(3): 22-42 (2018) - [j8]Sameer Wagh, Paul Cuff, Prateek Mittal:
Differentially Private Oblivious RAM. Proc. Priv. Enhancing Technol. 2018(4): 64-84 (2018) - [j7]Arsalan Mosenia, Xiaoliang Dai, Prateek Mittal, Niraj K. Jha:
PinMe: Tracking a Smartphone User around the World. IEEE Trans. Multi Scale Comput. Syst. 4(3): 420-435 (2018) - [c55]Tsung-Yen Yang, Christopher G. Brinton, Prateek Mittal, Mung Chiang, Andrew S. Lan:
Learning Informative and Private Representations via Generative Adversarial Networks. IEEE BigData 2018: 1534-1543 - [c54]Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal:
Acoustic Denial of Service Attacks on Hard Disk Drives. ASHES@CCS 2018: 34-39 - [c53]Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal:
MVG Mechanism: Differential Privacy under Matrix-Valued Query. CCS 2018: 230-246 - [c52]Vikash Sehwag, Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal:
Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints. CCS 2018: 2285-2287 - [c51]Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal:
Enhancing robustness of machine learning systems via data transformations. CISS 2018: 1-5 - [c50]Alexander N. Tait, Thomas Ferreira de Lima, Philip Y. Ma, Matthew P. Chang, Mitchell A. Nahmias, Bhavin J. Shastri, Prateek Mittal, Paul R. Prucnal:
Blind source separation in the physical layer. CISS 2018: 1-6 - [c49]Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection. CNS 2018: 1-9 - [c48]Daniel Cullina, Prateek Mittal, Negar Kiyavash:
Fundamental Limits of Database Alignment. ISIT 2018: 651-655 - [c47]Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal:
Towards a Timely Causality Analysis for Enterprise Security. NDSS 2018 - [c46]Daniel Cullina, Arjun Nitin Bhagoji, Prateek Mittal:
PAC-learning in the presence of adversaries. NeurIPS 2018: 228-239 - [c45]Surin Ahn, Maria Gorlatova, Parinaz Naghizadeh, Mung Chiang, Prateek Mittal:
Adaptive Fog-Based Output Security for Augmented Reality. VR/AR Network@SIGCOMM 2018: 1-6 - [c44]Peng Gao, Xusheng Xiao, Zhichun Li, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. USENIX ATC 2018: 113-126 - [c43]Austin Hounsel, Prateek Mittal, Nick Feamster:
Automatically Generating a Large, Culture-Specific Blocklist for China. FOCI @ USENIX Security Symposium 2018 - [c42]Saleh Soltan, Prateek Mittal, H. Vincent Poor:
BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid. USENIX Security Symposium 2018: 15-32 - [c41]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. USENIX Security Symposium 2018: 639-656 - [c40]Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, Prateek Mittal:
Bamboozling Certificate Authorities with BGP. USENIX Security Symposium 2018: 833-849 - [i44]Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal:
MVG Mechanism: Differential Privacy under Matrix-Valued Query. CoRR abs/1801.00823 (2018) - [i43]Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang, Prateek Mittal:
Tempest: Temporal Dynamics in Anonymity Systems. CoRR abs/1801.01932 (2018) - [i42]Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang:
Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos. CoRR abs/1801.02780 (2018) - [i41]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Blind De-anonymization Attacks using Social Networks. CoRR abs/1801.05534 (2018) - [i40]Arsalan Mosenia, Xiaoliang Dai, Prateek Mittal, Niraj K. Jha:
PinMe: Tracking a Smartphone User around the World. CoRR abs/1802.01468 (2018) - [i39]Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal:
DARTS: Deceiving Autonomous Cars with Toxic Signs. CoRR abs/1802.06430 (2018) - [i38]Thee Chanyaswad, Alex Dytso, H. Vincent Poor, Prateek Mittal:
A Differential Privacy Mechanism Design Under Matrix-Valued Query. CoRR abs/1802.10077 (2018) - [i37]Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection. CoRR abs/1803.06772 (2018) - [i36]Daniel Cullina, Prateek Mittal, Negar Kiyavash:
Fundamental Limits of Database Alignment. CoRR abs/1805.03829 (2018) - [i35]Daniel Cullina, Arjun Nitin Bhagoji, Prateek Mittal:
PAC-learning in the presence of evasion adversaries. CoRR abs/1806.01471 (2018) - [i34]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. CoRR abs/1806.02290 (2018) - [i33]Austin Hounsel, Prateek Mittal, Nick Feamster:
CensorSeeker: Generating a Large, Culture-Specific Blocklist for China. CoRR abs/1806.03255 (2018) - [i32]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. CoRR abs/1806.09339 (2018) - [i31]Saleh Soltan, Prateek Mittal, H. Vincent Poor:
Protecting the Grid against IoT Botnets of High-Wattage Devices. CoRR abs/1808.03826 (2018) - [i30]Daniel Cullina, Negar Kiyavash, Prateek Mittal, H. Vincent Poor:
Partial Recovery of Erdős-Rényi Graph Alignment via k-Core Alignment. CoRR abs/1809.03553 (2018) - [i29]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query Tool for Efficiently Investigating Risky Software Behaviors. CoRR abs/1810.03464 (2018) - [i28]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. CoRR abs/1811.07153 (2018) - [i27]Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin B. Calo:
Analyzing Federated Learning through an Adversarial Lens. CoRR abs/1811.12470 (2018) - 2017
- [j6]Shouling Ji, Prateek Mittal, Raheem A. Beyah:
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey. IEEE Commun. Surv. Tutorials 19(2): 1305-1326 (2017) - [c39]Liwei Song, Prateek Mittal:
POSTER: Inaudible Voice Commands. CCS 2017: 2583-2585 - [c38]Yanqi Zhou, Sameer Wagh, Prateek Mittal, David Wentzlaff:
Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks. HPCA 2017: 337-348 - [c37]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
How to Quantify Graph De-anonymization Risks. ICISSP (Revised Selected Papers) 2017: 84-104 - [c36]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Quantification of De-anonymization Risks in Social Networks. ICISSP 2017: 126-135 - [c35]Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu:
TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network. ICNP 2017: 1-10 - [c34]Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal:
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks. IEEE Symposium on Security and Privacy 2017: 977-992 - [c33]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Blind De-anonymization Attacks using Social Networks. WPES@CCS 2017: 1-4 - [c32]Mario Frank, Tiffany Hwu, Sakshi Jain, Robert T. Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Ivo Sluganovic, Dawn Song:
Using EEG-Based BCI Devices to Subliminally Probe for Private Information. WPES@CCS 2017: 133-136 - [i26]Changchang Liu, Supriyo Chakraborty, Prateek Mittal:
DEEProtect: Enabling Inference-based Access Control on Mobile Sensing Applications. CoRR abs/1702.06159 (2017) - [i25]Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby B. Lee:
Quantification of De-anonymization Risks in Social Networks. CoRR abs/1703.04873 (2017) - [i24]Yixin Sun, Anne Edmundson, Nick Feamster, Mung Chiang, Prateek Mittal:
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks. CoRR abs/1704.00843 (2017) - [i23]Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal:
Dimensionality Reduction as a Defense against Evasion Attacks on Machine Learning Classifiers. CoRR abs/1704.02654 (2017) - [i22]Liwei Song, Prateek Mittal:
Inaudible Voice Commands. CoRR abs/1708.07238 (2017) - [i21]Zhuotao Liu, Yushan Liu, Philipp Winter, Prateek Mittal, Yih-Chun Hu:
TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems. CoRR abs/1708.08162 (2017) - [i20]Thee Chanyaswad, Changchang Liu, Prateek Mittal:
Coupling Dimensionality Reduction with Generative Model for Non-Interactive Private Data Release. CoRR abs/1709.00054 (2017) - [i19]Arsalan Mosenia, Jad F. Bechara, Tao Zhang, Prateek Mittal, Mung Chiang:
ProCMotive: Bringing Programability and Connectivity into Isolated Vehicles. CoRR abs/1709.07450 (2017) - [i18]Yan Shvartzshnaider, Zvonimir Pavlinovic, Thomas Wies, Lakshminarayanan Subramanian, Prateek Mittal, Helen Nissenbaum:
The VACCINE Framework for Building DLP Systems. CoRR abs/1711.02742 (2017) - [i17]Mohammad Shahrad, Arsalan Mosenia, Liwei Song, Mung Chiang, David Wentzlaff, Prateek Mittal:
Acoustic Denial of Service Attacks on HDDs. CoRR abs/1712.07816 (2017) - 2016
- [j5]Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah:
Seed-Based De-Anonymizability Quantification of Social Networks. IEEE Trans. Inf. Forensics Secur. 11(7): 1398-1411 (2016) - [c31]Yushan Liu, Shouling Ji, Prateek Mittal:
SmartWalk: Enhancing Social Network Security via Adaptive Random Walks. CCS 2016: 492-503 - [c30]Yan Shvartzshnaider, Schrasing Tong, Thomas Wies, Paula Kift, Helen Nissenbaum, Lakshminarayanan Subramanian, Prateek Mittal:
Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms. HCOMP 2016: 209-218 - [c29]Shouling Ji, Weiqing Li, Shukun Yang, Prateek Mittal, Raheem A. Beyah:
On the relative de-anonymizability of graph data: Quantification and evaluation. INFOCOM 2016: 1-9 - [c28]Thee Chanyaswad, J. Morris Chang, Prateek Mittal, Sun-Yuan Kung:
Discriminant-component eigenfaces for privacy-preserving face recognition. MLSP 2016: 1-6 - [c27]Changchang Liu, Prateek Mittal:
LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships. NDSS 2016 - [c26]Changchang Liu, Supriyo Chakraborty, Prateek Mittal:
Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples. NDSS 2016 - [e1]Amir Houmansadr, Prateek Mittal:
6th USENIX Workshop on Free and Open Communications on the Internet, FOCI '16, Austin, TX, USA, August 8, 2016. USENIX Association 2016 [contents] - [i16]Sameer Wagh, Paul Cuff, Prateek Mittal:
Root ORAM: A Tunable Differentially Private Oblivious RAM. CoRR abs/1601.03378 (2016) - [i15]Yan Shvartzshnaider, Schrasing Tong, Thomas Wies, Paula Kift, Helen Nissenbaum, Lakshminarayanan Subramanian, Prateek Mittal:
Crowdsourcing Verifiable Contextual Integrity Norms. CoRR abs/1601.04740 (2016) - [i14]Daniel Cullina, Kushagra Singhal, Negar Kiyavash, Prateek Mittal:
On the Simultaneous Preservation of Privacy and Community Structure in Anonymized Networks. CoRR abs/1603.08028 (2016) - 2015
- [j4]Ben Wu, Bhavin J. Shastri, Prateek Mittal, Alexander N. Tait, Paul R. Prucnal:
Optical Signal Processing and Stealth Transmission for Privacy. IEEE J. Sel. Top. Signal Process. 9(7): 1185-1194 (2015) - [c25]Changchang Liu, Peng Gao, Matthew K. Wright, Prateek Mittal:
Exploiting Temporal Dynamics in Sybil Defenses. CCS 2015: 805-816 - [c24]Kevin Zhijie Chen, Warren He, Devdatta Akhawe, Vijay D'Silva, Prateek Mittal, Dawn Song:
ASPIRE: Iterative Specification Synthesis for Security. HotOS 2015 - [c23]Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah:
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. NDSS 2015 - [c22]Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal:
RAPTOR: Routing Attacks on Privacy in Tor. USENIX Security Symposium 2015: 271-286 - [c21]Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, Raheem A. Beyah:
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization. USENIX Security Symposium 2015: 303-318 - [i13]Changchang Liu, Prateek Mittal:
LinkMirage: How to Anonymize Links in Dynamic Social Systems. CoRR abs/1501.01361 (2015) - [i12]Peng Gao, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection. CoRR abs/1503.02985 (2015) - [i11]Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung Chiang, Prateek Mittal:
RAPTOR: Routing Attacks on Privacy in Tor. CoRR abs/1503.03940 (2015) - 2014
- [j3]Neil Zhenqiang Gong, Mario Frank, Prateek Mittal:
SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection. IEEE Trans. Inf. Forensics Secur. 9(6): 976-987 (2014) - [c20]Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar:
Re3: relay reliability reputation for anonymity systems. AsiaCCS 2014: 63-74 - [c19]Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal:
Anonymity on QuickSand: Using BGP to Compromise Tor. HotNets 2014: 14:1-14:7 - 2013
- [c18]Prateek Mittal, Charalampos Papamanthou, Dawn Xiaodong Song:
Preserving Link Privacy in Social Network Based Systems. NDSS 2013 - [c17]Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. NDSS 2013: 1-18 - [i10]Neil Zhenqiang Gong, Mario Frank, Prateek Mittal:
SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection. CoRR abs/1312.5035 (2013) - [i9]Mario Frank, Tiffany Hwu, Sakshi Jain, Robert T. Knight, Ivan Martinovic, Prateek Mittal, Daniele Perito, Dawn Song:
Subliminal Probing for Private Information via EEG-Based BCI Devices. CoRR abs/1312.6052 (2013) - 2012
- [b1]Prateek Mittal:
Trustworthy and scalable anonymous communication. University of Illinois Urbana-Champaign, USA, 2012 - [j2]Vinay Varadan, Prateek Mittal, Charles J. Vaske, Stephen C. Benz:
The Integration of Biological Pathway Knowledge in Cancer Genomics: A review of existing computational approaches. IEEE Signal Process. Mag. 29(1): 35-50 (2012) - [j1]Prateek Mittal, Nikita Borisov:
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems. ACM Trans. Inf. Syst. Secur. 15(1): 5:1-5:28 (2012) - [c16]Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, Apu Kapadia:
Cachet: a decentralized architecture for privacy preserving social networking with caching. CoNEXT 2012: 337-348 - [c15]Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song:
Evolution of social-attribute networks: measurements, modeling, and implications using google+. Internet Measurement Conference 2012: 131-144 - [c14]Prateek Mittal, Matthew Caesar, Nikita Borisov:
X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks. NDSS 2012 - [c13]Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia:
DECENT: A decentralized architecture for enforcing privacy in online social networks. PerCom Workshops 2012: 326-332 - [i8]Frank Li, Prateek Mittal, Matthew Caesar, Nikita Borisov:
SybilControl: Practical Sybil Defense with Computational Puzzles. CoRR abs/1201.2657 (2012) - [i7]Prateek Mittal, Charalampos Papamanthou, Dawn Song:
Preserving Link Privacy in Social Network Based Systems. CoRR abs/1208.6189 (2012) - [i6]Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. CoRR abs/1208.6326 (2012) - [i5]Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song:
Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+. CoRR abs/1209.0835 (2012) - 2011
- [c12]Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov:
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. CCS 2011: 215-226 - [c11]Sonia Jahid, Prateek Mittal, Nikita Borisov:
EASiER: encryption-based access control in social networks with efficient revocation. AsiaCCS 2011: 411-415 - [c10]Prateek Mittal, Femi G. Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg:
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. USENIX Security Symposium 2011 - [i4]Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov:
Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting. CoRR abs/1109.0597 (2011) - [i3]Prateek Mittal, Matthew Caesar, Nikita Borisov:
X-Vine: Secure and Pseudonymous Routing Using Social Networks. CoRR abs/1109.0971 (2011) - [i2]Prateek Mittal, Dongho Kim, Yih-Chun Hu, Matthew Caesar:
Towards Deployable DDoS Defense for Web Applications. CoRR abs/1110.1060 (2011) - [i1]Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia:
A Decentralized Architecture for Enforcing Privacy in Online Social Networks. CoRR abs/1111.5377 (2011) - 2010
- [c9]Qiyan Wang, Prateek Mittal, Nikita Borisov:
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems. CCS 2010: 308-318 - [c8]Prateek Mittal, Nikita Borisov, Carmela Troncoso, Alfredo Rial:
Scalable Anonymous Communication with Provable Security. HotSec 2010 - [c7]Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov:
BotGrep: Finding P2P Bots with Structured Graph Analysis. USENIX Security Symposium 2010: 95-110
2000 – 2009
- 2009
- [c6]Prateek Mittal, Nikita Borisov:
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. CCS 2009: 161-172 - [c5]Prateek Mittal, Vern Paxson, Robin Sommer, Mark Winterrowd:
Securing Mediated Trace Access Using Black-box Permutation Analysis. HotNets 2009 - [c4]George Danezis, Prateek Mittal:
SybilInfer: Detecting Sybil Nodes using Social Networks. NDSS 2009 - 2008
- [c3]Prateek Mittal, Nikita Borisov:
Information leaks in structured peer-to-peer anonymous communication systems. CCS 2008: 267-278 - [c2]Vijay Anand Reddy, Prateek Mittal, Indranil Gupta:
Fair K Mutual Exclusion Algorithm for Peer to Peer Systems. ICDCS 2008: 655-662 - 2007
- [c1]Nikita Borisov, George Danezis, Prateek Mittal, Parisa Tabriz:
Denial of service or denial of security? CCS 2007: 92-102
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint