Share This Author
The Limitations of Deep Learning in Adversarial Settings
- Nicolas Papernot, P. Mcdaniel, S. Jha, Matt Fredrikson, Z. B. Celik, A. Swami
- Computer ScienceIEEE European Symposium on Security and Privacy…
- 24 November 2015
TLDR
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
- William Enck, Peter Gilbert, Anmol Sheth
- Computer ScienceOSDI
- 4 October 2010
TLDR
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps
- Steven Arzt, Siegfried Rasthofer, P. Mcdaniel
- Computer SciencePLDI
- 9 June 2014
TLDR
Ensemble Adversarial Training: Attacks and Defenses
- Florian Tramèr, A. Kurakin, Nicolas Papernot, D. Boneh, P. Mcdaniel
- Computer ScienceICLR
- 19 May 2017
TLDR
Practical Black-Box Attacks against Machine Learning
- Nicolas Papernot, P. Mcdaniel, Ian J. Goodfellow, S. Jha, Z. B. Celik, A. Swami
- Computer ScienceAsiaCCS
- 8 February 2016
TLDR
Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks
- Nicolas Papernot, P. Mcdaniel, Xi Wu, S. Jha, A. Swami
- Computer ScienceIEEE Symposium on Security and Privacy (SP)
- 14 November 2015
TLDR
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples
- Nicolas Papernot, P. Mcdaniel, Ian J. Goodfellow
- Computer ScienceArXiv
- 24 May 2016
TLDR
On lightweight mobile phone application certification
- William Enck, Machigar Ongtang, P. Mcdaniel
- Computer ScienceCCS
- 9 November 2009
TLDR
IccTA: Detecting Inter-Component Privacy Leaks in Android Apps
- Li Li, Alexandre Bartel, P. Mcdaniel
- Computer ScienceIEEE/ACM 37th IEEE International Conference on…
- 16 May 2015
TLDR
Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples
- Nicolas Papernot, P. Mcdaniel, Ian J. Goodfellow, S. Jha, Z. B. Celik, A. Swami
- Computer ScienceArXiv
- 8 February 2016
TLDR
...
...