Cryptϵ: Crypto-assisted differential privacy on untrusted servers A Roy Chowdhury, C Wang, X He, A Machanavajjhala, S Jha Proceedings of the 2020 ACM SIGMOD International Conference on Management of …, 2020 | 98 | 2020 |
Concise explanations of neural networks using adversarial training P Chalasani, J Chen, AR Chowdhury, S Jha, X Wu arXiv, arXiv: 1810.06583, 2018 | 87* | 2018 |
Preech: A system for {Privacy-Preserving} speech transcription S Ahmed, AR Chowdhury, K Fawaz, P Ramanathan 29th USENIX Security Symposium (USENIX Security 20), 2703-2720, 2020 | 61 | 2020 |
LOCHA: a light-weight one-way cryptographic hash algorithm for wireless sensor network AR Chowdhury, T Chatterjee, S DasBit Procedia Computer Science 32, 497-504, 2014 | 48 | 2014 |
Eiffel: Ensuring integrity for federated learning A Roy Chowdhury, C Guo, S Jha, L van der Maaten Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 47 | 2022 |
Identifying and mitigating the security risks of generative ai C Barrett, B Boyd, E Bursztein, N Carlini, B Chen, J Choi, AR Chowdhury, ... Foundations and Trends® in Privacy and Security 6 (1), 1-52, 2023 | 41 | 2023 |
{Kalεido}:{Real-Time} privacy control for {Eye-Tracking} systems J Li, AR Chowdhury, K Fawaz, Y Kim 30th USENIX security symposium (USENIX security 21), 1793-1810, 2021 | 36* | 2021 |
Shadownet: A secure and efficient on-device model inference system for convolutional neural networks Z Sun, R Sun, C Liu, AR Chowdhury, L Lu, S Jha 2023 IEEE Symposium on Security and Privacy (SP), 1596-1612, 2023 | 29* | 2023 |
LMAC: A lightweight message authentication code for wireless sensor network AR Chowdhury, S DasBit 2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015 | 25 | 2015 |
Data privacy in trigger-action systems Y Chen, AR Chowdhury, R Wang, A Sabelfeld, R Chatterjee, E Fernandes 2021 IEEE Symposium on Security and Privacy (SP), 501-518, 2021 | 20 | 2021 |
Privacy implications of shuffling C Meehan, AR Chowdhury, K Chaudhuri, S Jha International Conference on Learning Representations, 2021 | 14* | 2021 |
Data-dependent differentially private parameter learning for directed graphical models AR Chowdhury, T Rekatsinas, S Jha International Conference on Machine Learning, 1939-1951, 2020 | 12 | 2020 |
Public order preserving cipher generation scheme for distributed computing A Roy Chowdhury, P Ramanathan Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 7 | 2018 |
Strengthening Order Preserving Encryption with Differential Privacy A Roy Chowdhury, B Ding, S Jha, W Liu, J Zhou https://arxiv.org/abs/2009.05679, 0 | 6* | |
Can Membership Inferencing be Refuted? Z Kong, AR Chowdhury, K Chaudhuri arXiv preprint arXiv:2303.03648, 2023 | 5 | 2023 |
Forgeability and Membership Inference Attacks Z Kong, A Roy Chowdhury, K Chaudhuri Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security …, 2022 | 5 | 2022 |
Robustness of locally differentially private graph analysis against poisoning J Imola, AR Chowdhury, K Chaudhuri arXiv preprint arXiv:2210.14376, 2022 | 1 | 2022 |
PPU: Privacy-Aware Purchasing Unit for Residential Customers in Smart Electric Grids AR Chowdhury, P Ramanathan 2018 31st International Conference on VLSI Design and 2018 17th …, 2018 | 1 | 2018 |
Metric Differential Privacy at the User-Level J Imola, AR Chowdhury, K Chaudhuri arXiv preprint arXiv:2405.02665, 2024 | | 2024 |
FairProof: Confidential and Certifiable Fairness for Neural Networks C Yadav, AR Chowdhury, D Boneh, K Chaudhuri arXiv preprint arXiv:2402.12572, 2024 | | 2024 |