Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks A Shafahi, WR Huang, M Najibi, O Suciu, C Studer, T Dumitras, ... Advances in Neural Information Processing Systems 31 (NeurIPS 2018), 2018 | 1143 | 2018 |
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits C Sabottke, O Suciu, T Dumitraș 24th USENIX Security Symposium (USENIX Security 15), 1041-1056, 2015 | 392 | 2015 |
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks O Suciu, R Marginean, Y Kaya, H Daume III, T Dumitras 27th USENIX Security Symposium (USENIX Security 18), 1299-1316, 2018 | 322 | 2018 |
Exploring Adversarial Examples in Malware Detection O Suciu, SE Coull, J Johns 2019 IEEE Security and Privacy Workshops (SPW), 8-14, 2019 | 227 | 2019 |
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits O Suciu, C Nelson, Z Lyu, T Bao, T Dumitraș 31st USENIX Security Symposium (USENIX Security 22), 377-394, 2022 | 38 | 2022 |
Summoning demons: The pursuit of exploitable bugs in machine learning R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş arXiv preprint arXiv:1701.04739, 2017 | 22 | 2017 |
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights J Jacobs, S Romanosky, O Suciu, B Edwards, A Sarabi arXiv preprint arXiv:2302.14172, 2023 | 11 | 2023 |
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks O Suciu, R Mărginean, Y Kaya, H Daumé III, T Dumitraş arXiv preprint arXiv:1803.06975, 2018 | 2 | 2018 |
Data-Driven Techniques for Vulnerability Assessments OP Suciu University of Maryland, College Park, 2021 | 1 | 2021 |
Systems and methods for predicting development of functional vulnerability exploits T Bao, C Nelson, Z Lyu, T Dumitras, O Suciu US Patent App. 18/169,674, 2023 | | 2023 |
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System T Dumitraş, Y Kaya, R Mărginean, O Suciu Security Protocols XXVI: 26th International Workshop, 150-162, 2018 | | 2018 |
Poster: Exploring Adversarial Examples in Malware Detection O Suciu, SE Coull, J Johns | | |