Prateek Mittal
Prateek Mittal
Associate Professor, Princeton University
Dirección de correo verificada de princeton.edu - Página principal
Título
Citado por
Citado por
Año
Advances and open problems in federated learning
P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ...
arXiv preprint arXiv:1912.04977, 2019
7712019
Sybilinfer: Detecting sybil nodes using social networks.
G Danezis, P Mittal
NDSS, 1-15, 2009
5702009
EASiER: Encryption-based access control in social networks with efficient revocation
S Jahid, P Mittal, N Borisov
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
5572011
BotGrep: Finding P2P Bots with Structured Graph Analysis.
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
USENIX security symposium 10, 95-110, 2010
3002010
Evolution of social-attribute networks: measurements, modeling, and implications using google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
Proceedings of the 2012 Internet Measurement Conference, 131-144, 2012
2412012
Analyzing federated learning through an adversarial lens
AN Bhagoji, S Chakraborty, P Mittal, S Calo
International Conference on Machine Learning, 634-643, 2019
2302019
Denial of service or denial of security?
N Borisov, G Danezis, P Mittal, P Tabriz
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2202007
{RAPTOR}: Routing attacks on privacy in tor
Y Sun, A Edmundson, L Vanbever, O Li, J Rexford, M Chiang, P Mittal
24th {USENIX} Security Symposium ({USENIX} Security 15), 271-286, 2015
1882015
BlackIoT: IoT botnet of high wattage devices can disrupt the power grid
S Soltan, P Mittal, HV Poor
27th {USENIX} Security Symposium ({USENIX} Security 18), 15-32, 2018
1642018
Sybilbelief: A semi-supervised learning approach for structure-based sybil detection
NZ Gong, M Frank, P Mittal
IEEE Transactions on Information Forensics and Security 9 (6), 976-987, 2014
1632014
Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples.
C Liu, S Chakraborty, P Mittal
NDSS 16, 21-24, 2016
1562016
DECENT: A decentralized architecture for enforcing privacy in online social networks
S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
1542012
Cachet: a decentralized architecture for privacy preserving social networking with caching
S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia
Proceedings of the 8th international conference on Emerging networking …, 2012
1462012
Darts: Deceiving autonomous cars with toxic signs
C Sitawarin, AN Bhagoji, A Mosenia, M Chiang, P Mittal
arXiv preprint arXiv:1802.06430, 2018
1412018
Dimensionality reduction as a defense against evasion attacks on machine learning classifiers
AN Bhagoji, D Cullina, P Mittal
arXiv preprint arXiv:1704.02654 2, 1, 2017
1282017
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
P Mittal, A Khurshid, J Juen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and Communications …, 2011
1222011
Preserving link privacy in social network based systems
P Mittal, C Papamanthou, D Song
arXiv preprint arXiv:1208.6189, 2012
1082012
Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization
S Ji, W Li, P Mittal, X Hu, R Beyah
24th {USENIX} Security Symposium ({USENIX} Security 15), 303-318, 2015
1052015
Enhancing robustness of machine learning systems via data transformations
AN Bhagoji, D Cullina, C Sitawarin, P Mittal
2018 52nd Annual Conference on Information Sciences and Systems (CISS), 1-5, 2018
1022018
Shadowwalker: peer-to-peer anonymous communication using redundant structured topologies
P Mittal, N Borisov
Proceedings of the 16th ACM conference on Computer and communications …, 2009
972009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20