Follow
Stacey Truex
Stacey Truex
Assistant Professor, Denison University
Verified email at denison.edu - Homepage
Title
Cited by
Cited by
Year
A hybrid approach to privacy-preserving federated learning
S Truex, N Baracaldo, A Anwar, T Steinke, H Ludwig, R Zhang, Y Zhou
Proceedings of the 12th ACM workshop on artificial intelligence and security …, 2019
8632019
Data poisoning attacks against federated learning systems
V Tolpegin, S Truex, ME Gursoy, L Liu
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
5712020
Towards demystifying membership inference attacks
S Truex, L Liu, ME Gursoy, L Yu, W Wei
arXiv preprint arXiv:1807.09173, 2018
368*2018
LDP-Fed: Federated learning with local differential privacy
S Truex, L Liu, KH Chow, ME Gursoy, W Wei
Proceedings of the third ACM international workshop on edge systems …, 2020
3152020
Differentially private model publishing for deep learning
L Yu, L Liu, C Pu, ME Gursoy, S Truex
2019 IEEE symposium on security and privacy (SP), 332-349, 2019
2892019
Tifl: A tier-based federated learning system
Z Chai, A Ali, S Zawad, S Truex, A Anwar, N Baracaldo, Y Zhou, H Ludwig, ...
Proceedings of the 29th international symposium on high-performance parallel …, 2020
2432020
Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation
M De Cock, R Dowsley, C Horst, R Katti, ACA Nascimento, WS Poon, ...
IEEE Transactions on Dependable and Secure Computing 16 (2), 217-230, 2017
1482017
A framework for evaluating gradient leakage attacks in federated learning
W Wei, L Liu, M Loper, KH Chow, ME Gursoy, S Truex, Y Wu
arXiv preprint arXiv:2004.10397, 2020
1332020
Fast, privacy preserving linear regression over distributed datasets based on pre-distributed data
M Cock, R Dowsley, ACA Nascimento, SC Newman
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015
1082015
Differentially private and utility preserving publication of trajectory data
ME Gursoy, L Liu, S Truex, L Yu
IEEE Transactions on Mobile Computing 18 (10), 2315-2329, 2018
1002018
Utility-aware synthesis of differentially private and attack-resilient location traces
ME Gursoy, L Liu, S Truex, L Yu, W Wei
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
892018
Secure and utility-aware data collection with condensed local differential privacy
ME Gursoy, A Tamersoy, S Truex, W Wei, L Liu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2365-2378, 2019
872019
Population cost prediction on public healthcare datasets
S Sushmita, S Newman, J Marquardt, P Ram, V Prasad, MD Cock, ...
Proceedings of the 5th international conference on digital health 2015, 87-94, 2015
802015
A framework for evaluating client privacy leakages in federated learning
W Wei, L Liu, M Loper, KH Chow, ME Gursoy, S Truex, Y Wu
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
712020
Deep neural network ensembles against deception: Ensemble diversity, accuracy and robustness
L Liu, W Wei, KH Chow, M Loper, E Gursoy, S Truex, Y Wu
2019 IEEE 16th international conference on mobile ad hoc and sensor systems …, 2019
692019
Dynamic hierarchical classification for patient risk-of-readmission
S Basu Roy, A Teredesai, K Zolfaghar, R Liu, D Hazel, S Newman, ...
Proceedings of the 21th ACM SIGKDD international conference on knowledge …, 2015
692015
Adversarial objectness gradient attacks in real-time object detection systems
KH Chow, L Liu, M Loper, J Bae, ME Gursoy, S Truex, W Wei, Y Wu
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
552020
Effects of differential privacy and data skewness on membership inference vulnerability
S Truex, L Liu, ME Gursoy, W Wei, L Yu
2019 First IEEE international conference on trust, privacy and security in …, 2019
452019
Predicting 30-day risk and cost of" all-cause" hospital readmissions
S Sushmita, G Khulbe, A Hasan, S Newman, P Ravindra, SB Roy, ...
Workshops at the thirtieth AAAI conference on artificial intelligence, 2016
432016
Adversarial examples in deep learning: Characterization and divergence
W Wei, L Liu, M Loper, S Truex, L Yu, ME Gursoy, Y Wu
arXiv preprint arXiv:1807.00051, 2018
312018
The system can't perform the operation now. Try again later.
Articles 1–20