Prateek Mittal
Prateek Mittal
Associate Professor, Princeton University
Verified email at princeton.edu - Homepage
TitleCited byYear
EASiER: Encryption-based access control in social networks with efficient revocation
S Jahid, P Mittal, N Borisov
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
4692011
Sybilinfer: Detecting sybil nodes using social networks.
G Danezis, P Mittal
NDSS, 1-15, 2009
4532009
BotGrep: Finding P2P Bots with Structured Graph Analysis.
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
USENIX Security Symposium 10, 95-110, 2010
2352010
Evolution of social-attribute networks: measurements, modeling, and implications using google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
Proceedings of the 2012 Internet Measurement Conference, 131-144, 2012
1952012
Denial of service or denial of security?
N Borisov, G Danezis, P Mittal, P Tabriz
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1902007
DECENT: A decentralized architecture for enforcing privacy in online social networks
S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
1282012
Cachet: a decentralized architecture for privacy preserving social networking with caching
S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia
Proceedings of the 8th international conference on Emerging networking …, 2012
1152012
{RAPTOR}: Routing Attacks on Privacy in Tor
Y Sun, A Edmundson, L Vanbever, O Li, J Rexford, M Chiang, P Mittal
24th {USENIX} Security Symposium ({USENIX} Security 15), 271-286, 2015
1082015
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
P Mittal, A Khurshid, J Juen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
952011
Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples.
C Liu, S Chakraborty, P Mittal
NDSS 16, 21-24, 2016
882016
Sybilbelief: A semi-supervised learning approach for structure-based sybil detection
NZ Gong, M Frank, P Mittal
IEEE Transactions on Information Forensics and Security 9 (6), 976-987, 2014
832014
Shadowwalker: peer-to-peer anonymous communication using redundant structured topologies
P Mittal, N Borisov
Proceedings of the 16th ACM conference on Computer and communications …, 2009
822009
Information leaks in structured peer-to-peer anonymous communication systems
P Mittal, N Borisov
ACM Transactions on Information and System Security (TISSEC) 15 (1), 5, 2012
812012
Preserving link privacy in social network based systems
P Mittal, C Papamanthou, D Song
arXiv preprint arXiv:1208.6189, 2012
782012
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
P Mittal, FG Olumofin, C Troncoso, N Borisov, I Goldberg
USENIX Security Symposium, 31-31, 2011
632011
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
S Ji, W Li, NZ Gong, P Mittal, RA Beyah
NDSS, 2015
622015
Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th {USENIX} Security Symposium ({USENIX} Security 15), 303-318, 2015
602015
Dimensionality reduction as a defense against evasion attacks on machine learning classifiers
AN Bhagoji, D Cullina, P Mittal
arXiv preprint arXiv:1704.02654, 2017
572017
Pisces: Anonymous communication using social networks
P Mittal, M Wright, N Borisov
arXiv preprint arXiv:1208.6326, 2012
532012
Parisa Tabriz, Denial of service or denial of security
N Borisov, G Danezis, P Mittal
Proceedings of the 14th ACM conference on Computer and communications security, 2007
532007
The system can't perform the operation now. Try again later.
Articles 1–20