Saurabh Shintre
Saurabh Shintre
Principal Researcher, NortonLifeLock Research Group
Verified email at nortonlifelock.com
Title
Cited by
Cited by
Year
Detecting adversarial samples from artifacts
R Feinman, RR Curtin, S Shintre, AB Gardner
arXiv preprint arXiv:1703.00410, 2017
3372017
" Real" and" complex" network codes: promises and challenges
S Shintre, S Katti, S Jaggi, BK Dey, D Katabi, M Medard
2008 Fourth Workshop on Network Coding, Theory and Applications, 1-6, 2008
382008
How feasible is network coding in current satellite systems?
F Vieira, S Shintre, J Barros
2010 5th Advanced Satellite Multimedia Systems Conference and the 11th …, 2010
322010
Real network codes
S Katti, S Shintre, S Jaggi, D Katabi, M Medard
Proc. Forty-Fifth Annual Allerton Conference, 389-395, 2007
302007
Probabilistic key distribution in vehicular networks with infrastructure support
J Almeida, S Shintre, M Boban, J Barros
2012 IEEE Global Communications Conference (GLOBECOM), 973-978, 2012
162012
Detecting adversarial samples from artifacts. arXiv preprint (2017)
R Feinman, RR Curtin, S Shintre, AB Gardner
arXiv preprint arXiv:1703.00410, 2017
52017
Adversarial machine learning at scale
R Feinman, RR Curtin, S Shintre, AB Gardner
technical Report, 2016
52016
Systems and methods for protecting computing resources
S Shintre, A Parker-Wood
US Patent 10,015,182, 2018
4*2018
Probabilistic key distribution in vehicular networks with infrastructure support
JFCDO Barros, JPP De Almeida, M Boban, S Shintre
US Patent 9,276,743, 2016
42016
Systems and methods for protecting computing resources
S Shintre, A Parker-Wood
US Patent 10,015,182, 2018
32018
Gradient similarity: An explainable approach to detect adversarial attacks against deep learning
J Dhaliwal, S Shintre
arXiv preprint arXiv:1806.10707, 2018
32018
Analog network coding
S Katti, S Shintre, S Jaggi, D Katabi, M Medard
In ACM SIGCOMM, 2007
32007
Anonymity leakage in private VoIP networks
S Shintre, V Gligor, J ao Barros
IEEE Transactions on Dependable and Secure Computing 15 (1), 14-26, 2015
22015
Generalized delay-secrecy-throughput trade-offs in mobile ad-hoc networks
S Shintre, L Sassatelli, J Barros
2011 IEEE-APS Topical Conference on Antennas and Propagation in Wireless …, 2011
22011
Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices
Y Zou, K Roundy, A Tamersoy, S Shintre, J Roturier, F Schaub
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
12020
Verifying that the influence of a user data point has been removed from a machine learning classifier
S Shintre, J Dhaliwal
US Patent 10,225,277, 2019
12019
Decrypting network traffic on a middlebox device using a trusted execution environment
Y Sun, D Marino, SK Nanda, S Shintre, BT Witten, RA Frederick, Q Li
US Patent App. 10/044,691, 2018
1*2018
Insider threat detection under user-resource bi-partite graphs
S Shintre, S Bhatkar, AK Kayyoor
US Patent 10,686,816, 2020
2020
Providing adversarial perturbations to media
S Shintre, RA Feinman
US Patent 10,542,034, 2020
2020
Encrypting and decrypting sensitive files on a network device
KA Roundy, Y Sun, C Gates, M Hart, S Shintre, BT Witten
US Patent 10,534,933, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20