Scalable graph-based bug search for firmware images Q Feng, R Zhou, C Xu, Y Cheng, B Testa, H Yin Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 455 | 2016 |
A general framework for auditing differentially private machine learning F Lu, J Munoz, M Fuchs, T LeBlond, E Zaresky-Williams, E Raff, F Ferraro, ... Advances in Neural Information Processing Systems 35, 4165-4176, 2022 | 26 | 2022 |
Probing the Transition to Dataset-Level Privacy in ML Models Using an Output-Specific and Data-Resolved Privacy Profile T LeBlond, J Munoz, F Lu, M Fuchs, E Zaresky-Williams, E Raff, B Testa Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023 | 2 | 2023 |
Sparse private lasso logistic regression A Khanna, F Lu, E Raff, B Testa arXiv preprint arXiv:2304.12429, 2023 | 2 | 2023 |
Differentially Private Logistic Regression with Sparse Solutions A Khanna, F Lu, E Raff, B Testa Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security …, 2023 | 1 | 2023 |
Privacy against real-time speech emotion detection via acoustic adversarial evasion of machine learning B Testa, Y Xiao, H Sharma, A Gump, A Salekin Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2023 | 1 | 2023 |
The Physical Significance of the Eigenvalues in Adaptive Arrays BPV Testa, VC Vannicola Digital Signal Processing 5 (2), 91-96, 1995 | 1 | 1995 |
Only My Model On My Data: A Privacy Preserving Approach Protecting one Model and Deceiving Unauthorized Black-Box Models W Chai, B Testa, H Ren, A Salekin, S Velipasalar arXiv preprint arXiv:2402.09316, 2024 | | 2024 |
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation X Hu, B Testa, H Yin Security and Privacy in Communication Networks: 15th EAI International …, 2019 | | 2019 |