Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 439 | 2017 |
Understanding membership inferences on well-generalized learning models Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ... arXiv preprint arXiv:1802.04889, 2018 | 275 | 2018 |
Leakage-abuse attacks against order-revealing encryption P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart 2017 IEEE symposium on security and privacy (SP), 655-672, 2017 | 250 | 2017 |
Synthesizing plausible privacy-preserving location traces V Bindschaedler, R Shokri 2016 IEEE Symposium on Security and Privacy (SP), 546-563, 2016 | 230 | 2016 |
Plausible deniability for privacy-preserving data synthesis V Bindschaedler, R Shokri, CA Gunter arXiv preprint arXiv:1708.07975, 2017 | 182 | 2017 |
Enhanced membership inference attacks against machine learning models J Ye, A Maddi, SK Murakonda, V Bindschaedler, R Shokri Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 176 | 2022 |
Sok: The faults in our asrs: An overview of attacks against automatic speech recognition and speaker identification systems H Abdullah, K Warren, V Bindschaedler, N Papernot, P Traynor 2021 IEEE symposium on security and privacy (SP), 730-747, 2021 | 137 | 2021 |
Practicing oblivious access on cloud storage: the gap, the fallacy, and the new way forward V Bindschaedler, M Naveed, X Pan, XF Wang, Y Huang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 134 | 2015 |
The inconvenient truth about web certificates N Vratonjic, J Freudiger, V Bindschaedler, JP Hubaux Economics of information security and privacy iii, 79-117, 2013 | 111 | 2013 |
The tao of inference in privacy-protected databases V Bindschaedler, P Grubbs, D Cash, T Ristenpart, V Shmatikov Cryptology ePrint Archive, 2017 | 103 | 2017 |
Towards measuring membership privacy Y Long, V Bindschaedler, CA Gunter arXiv preprint arXiv:1712.09136, 2017 | 100 | 2017 |
A pragmatic approach to membership inferences on machine learning models Y Long, L Wang, D Bu, V Bindschaedler, X Wang, H Tang, CA Gunter, ... 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 521-534, 2020 | 79 | 2020 |
Achieving differential privacy in secure multiparty data aggregation protocols on star networks V Bindschaedler, S Rane, AE Brito, V Rao, E Uzun Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 36 | 2017 |
Method for differentially private aggregation in a star topology under a realistic adversarial model S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao US Patent 10,223,547, 2019 | 33 | 2019 |
How others compromise your location privacy: The case of shared public IPs at hotspots N Vratonjic, K Huguenin, V Bindschaedler, JP Hubaux Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013 | 24 | 2013 |
A location-privacy threat stemming from the use of shared public IP addresses N Vratonjic, K Huguenin, V Bindschaedler, JP Hubaux IEEE Transactions on Mobile Computing 13 (11), 2445-2457, 2014 | 23 | 2014 |
Demystifying limited adversarial transferability in automatic speech recognition systems H Abdullah, A Karlekar, V Bindschaedler, P Traynor International Conference on Learning Representations (ICLR), 2021 | 14 | 2021 |
SoK: Memorization in General-Purpose Large Language Models V Hartmann, A Suri, V Bindschaedler, D Evans, S Tople, R West arXiv preprint arXiv:2310.18362, 2023 | 11 | 2023 |
Permpress: Machine learning-based pipeline to evaluate permissions in app privacy policies MS Rahman, P Naghavi, B Kojusner, S Afroz, B Williams, S Rampazzi, ... IEEE Access 10, 89248-89269, 2022 | 11 | 2022 |
NRF: A Naive re-identification framework SK Karmaker Santu, V Bindschadler, CX Zhai, CA Gunter Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 121-132, 2018 | 11 | 2018 |