Elevating Defenses: Bridging Adversarial Training and Watermarking for Model ResilienceJanvi ThakkarGiulio Zizzoet al.2024AAAI 2024
Differentially Private and Adversarially Robust Machine Learning: An Empirical EvaluationJanvi ThakkarGiulio Zizzoet al.2024AAAI 2024
Certified Robustness of Static Deep Learning-based Malware Detectors against Patch and Append AttacksDaniel GibertGiulio Zizzoet al.2023CCS 2023
Sunfish: An Open Centralized Composable HPC Management FrameworkPhil CaytonMichael Aguilaret al.2023SC 2023
Fully Homomorphic Encryption for Computer Architects: A Fundamental Characterization StudySubhankar PalKarthik Swaminathanet al.2023MICRO 2023
Benchmarking the Effect of Poisoning Defenses on the Security and Bias of Deep Learning ModelsNathalie Baracaldo AngelFarhan Ahmedet al.2023S&P 2023
Go or No Go: Differential Fuzzing of Native and C LibrariesAlessandro SorniottiMichael Weissbacheret al.2023S&P 2023
Boundary Adversarial Examples Against Adversarial OverfittingMuhammad Zaid HameedBeat Buesser2022NeurIPS 2022