Matt Fredrikson
Matt Fredrikson
Assistant Professor, Carnegie Mellon University
Bestätigte E-Mail-Adresse bei cs.cmu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
16462016
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
6372015
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
USENIX Security Symposium, 17-32, 2014
3072014
Synthesizing near-optimal malware specifications from suspicious behaviors
M Fredrikson, S Jha, M Christodorescu, R Sailer, X Yan
2010 IEEE Symposium on Security and Privacy, 45-60, 2010
2282010
A layered architecture for detecting malicious behaviors
L Martignoni, E Stinson, M Fredrikson, S Jha, JC Mitchell
International Symposium on Recent Advances in Intrusion Detection, 78-97, 2008
1562008
Repriv: Re-imagining content personalization and in-browser privacy
M Fredrikson, B Livshits
2011 IEEE Symposium on Security and Privacy, 131-146, 2011
137*2011
Verified security for browser extensions
A Guha, M Fredrikson, B Livshits, N Swamy
2011 IEEE symposium on security and privacy, 115-130, 2011
1312011
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber situational awareness, 3-13, 2010
1312010
On the Practical Exploitability of Dual EC DRBG in TLS Implementations
S Checkoway, M Fredrikson, R Niederhagen, M Green, T Lange, ...
USENIX Security Symposium, 319-335, 2014
120*2014
Privacy risk in machine learning: Analyzing the connection to overfitting
S Yeom, I Giacomelli, M Fredrikson, S Jha
2018 IEEE 31st Computer Security Foundations Symposium (CSF), 2018
118*2018
Mining graph patterns efficiently via randomized summaries
C Chen, CX Lin, M Fredrikson, M Christodorescu, X Yan, J Han
Proceedings of the VLDB Endowment 2 (1), 742-753, 2009
832009
A methodology for formalizing model-inversion attacks
X Wu, M Fredrikson, S Jha, JF Naughton
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 355-370, 2016
522016
Automatic Generation of Remediation Procedures for Malware Infections.
R Paleari, L Martignoni, E Passerini, D Davidson, M Fredrikson, JT Giffin, ...
USENIX Security Symposium, 419-434, 2010
502010
Morepriv: Mobile os support for application personalization and privacy
D Davidson, M Fredrikson, B Livshits
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
402014
Surreptitiously Weakening Cryptographic Systems.
B Schneier, M Fredrikson, T Kohno, T Ristenpart
IACR Cryptol. ePrint Arch. 2015, 97, 2015
392015
End-to-end software diversification of internet services
M Christodorescu, M Fredrikson, S Jha, J Giffin
Moving Target Defense, 117-130, 2011
362011
Proxy non-discrimination in data-driven systems
A Datta, M Fredrikson, G Ko, P Mardziel, S Sen
arXiv preprint arXiv:1707.08120, 2017
342017
Use privacy in data-driven systems: Theory and experiments with machine learnt programs
A Datta, M Fredrikson, G Ko, P Mardziel, S Sen
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
322017
ZØ: An Optimizing Distributing Zero-Knowledge Compiler
M Fredrikson, B Livshits
USENIX Security Symposium, 909-924, 2014
312014
Verifying and synthesizing constant-resource implementations with types
M Dehesa-Azuara, M Fredrikson, J Hoffmann
2017 IEEE Symposium on Security and Privacy (SP), 710-728, 2017
292017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20