Shallow-deep networks: Understanding and mitigating network overthinking Y Kaya, S Hong, T Dumitras International conference on machine learning, 3301-3310, 2019 | 286 | 2019 |
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks S Hong, P Frigo, Y Kaya, C Giuffrida, T Dumitraş 28th USENIX Security Symposium (USENIX Security 19). Santa Clara, CA: USENIX …, 2019 | 193 | 2019 |
On the effectiveness of mitigating data poisoning attacks with gradient shaping S Hong, V Chandrasekaran, Y Kaya, T Dumitraş, N Papernot arXiv preprint arXiv:2002.11497, 2020 | 127 | 2020 |
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets F Tramèr, R Shokri, AS Joaquin, H Le, M Jagielski, S Hong, N Carlini ACM Conference on Computer and Communications Security (CCS), 2022 | 84 | 2022 |
Security analysis of deep neural networks operating in the presence of cache side-channel attacks S Hong, M Davinroy, Y Kaya, SN Locke, I Rackow, K Kulda, ... arXiv preprint arXiv:1810.03487, 2018 | 79 | 2018 |
A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference S Hong, Y Kaya, IV Modoranu, T Dumitraş 9th International Conference on Learning Representations (ICLR 2021)., 2021 | 61 | 2021 |
Handcrafted backdoors in deep neural networks S Hong, N Carlini, A Kurakin Advances in Neural Information Processing Systems 35, 8068-8080, 2022 | 57 | 2022 |
Data Poisoning Won't Save You From Facial Recognition E Radiya-Dixit, S Hong, N Carlini, F Tramèr 10th International Conference on Learning Representations (ICLR 2022)., 2022 | 53 | 2022 |
Go serverless: Securing cloud via serverless design patterns S Hong, A Srivastava, W Shambrook, T Dumitraș 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18), 2018 | 48 | 2018 |
How to 0wn NAS in Your Spare Time S Hong, M Davinroy, Y Kaya, D Dachman-Soled, T Dumitraş 8th International Conference on Learning Representations (ICLR 2020)., 2020 | 38 | 2020 |
On the effectiveness of regularization against membership inference attacks Y Kaya, S Hong, T Dumitras arXiv preprint arXiv:2006.05336, 2020 | 30 | 2020 |
Summoning demons: The pursuit of exploitable bugs in machine learning R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş arXiv preprint arXiv:1701.04739, 2017 | 22 | 2017 |
Improving Cross-platform Binary Analysis Using Representation Learning via Graph Alignment G Kim, S Hong, M Franz, D Song Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 15 | 2022 |
Qu-anti-zation: Exploiting quantization artifacts for achieving adversarial outcomes S Hong, MA Panaitescu-Liess, Y Kaya, T Dumitras Advances in Neural Information Processing Systems 34, 9303-9316, 2021 | 15 | 2021 |
Certified malware in south korea: A localized study of breaches of trust in code-signing PKI ecosystem B Kwon, S Hong, Y Jeon, D Kim Information and Communications Security: 23rd International Conference …, 2021 | 9 | 2021 |
Page: Answering graph pattern queries via knowledge graph embedding S Hong, N Park, T Chakraborty, H Kang, S Kwon International Conference on Big Data, 87-99, 2018 | 9 | 2018 |
A scanner deeply: Predicting gaze heatmaps on visualizations using crowdsourced eye movement data S Shin, S Chung, S Hong, N Elmqvist IEEE Transactions on Visualization and Computer Graphics 29 (1), 396-406, 2022 | 7 | 2022 |
Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection S Hong, A Nicolae, A Srivastava, T Dumitraş Computers & Security 79, 190-207, 2018 | 5 | 2018 |
SENA: preserving social structure for network embedding S Hong, T Chakraborty, S Ahn, G Husari, N Park Proceedings of the 28th ACM Conference on hypertext and social media, 235-244, 2017 | 5 | 2017 |
Privacy backdoors: Enhancing membership inference through poisoning pre-trained models Y Wen, L Marchyok, S Hong, J Geiping, T Goldstein, N Carlini arXiv preprint arXiv:2404.01231, 2024 | 3 | 2024 |