Transcend: Detecting Concept Drift in Malware Classification Models R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ... USENIX Security Symposium. Vancouver, BC, Canada., 2017 | 339 | 2017 |
An Automated Social Graph De-anonymization Technique K Sharad, G Danezis Workshop on Privacy in the Electronic Society (WPES). Scottsdale, Arizona …, 2014 | 81 | 2014 |
De-anonymizing D4D Datasets K Sharad, G Danezis Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs …, 2013 | 40 | 2013 |
True friends let you down: Benchmarking social graph anonymization schemes K Sharad Workshop on Artificial Intelligence and Security (AISec). Vienna, Austria …, 2016 | 13 | 2016 |
Change of Guard: The Next Generation of Social Graph De-anonymization Attacks K Sharad Workshop on Artificial Intelligence and Security (AISec). Vienna, Austria …, 2016 | 10 | 2016 |
Learning to de-anonymize social networks K Sharad University of Cambridge, Computer Laboratory, 2016 | 8 | 2016 |
On the Security of Randomized Defenses Against Adversarial Samples K Sharad, GA Marson, HTT Truong, G Karame ACM ASIA Conference on Computer and Communications Security (ASIACCS …, 2020 | 3 | 2020 |
Optimizing the Sequence of Vulnerability Scanning Injections K Funaya, S Bajaj, K Sharad, A Srivastava IEEE Conference on Dependable and Secure Computing (DSC), 1-2, 2018 | 2 | 2018 |
System for secure federated learning K Sharad, G Karame, GA Marson US Patent 11,836,643, 2023 | 1 | 2023 |
Misleading Metrics: On Evaluating ML for Malware with Confidence (Poster) R Jordaney, Z Wang, D Papini, I Nouretdinov, K Sharad, L Cavallaro IEEE Symposium on Security and Privacy (S&P). San Jose, California, USA., 2016 | 1* | 2016 |
Method and system for securing machine learning models K Sharad US Patent 11,341,277, 2022 | | 2022 |
Privacy Leak in Egonets (Poster) K Sharad, G Danezis University of Cambridge Computer Laboratory 75th Anniversary. Cambridge, UK., 2013 | | 2013 |