关注
Octavian Suciu
Octavian Suciu
在 umd.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
A Shafahi, WR Huang, M Najibi, O Suciu, C Studer, T Dumitras, ...
Advances in Neural Information Processing Systems 31 (NeurIPS 2018), 2018
11432018
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits
C Sabottke, O Suciu, T Dumitraș
24th USENIX Security Symposium (USENIX Security 15), 1041-1056, 2015
3922015
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
O Suciu, R Marginean, Y Kaya, H Daume III, T Dumitras
27th USENIX Security Symposium (USENIX Security 18), 1299-1316, 2018
3222018
Exploring Adversarial Examples in Malware Detection
O Suciu, SE Coull, J Johns
2019 IEEE Security and Privacy Workshops (SPW), 8-14, 2019
2272019
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
O Suciu, C Nelson, Z Lyu, T Bao, T Dumitraș
31st USENIX Security Symposium (USENIX Security 22), 377-394, 2022
382022
Summoning demons: The pursuit of exploitable bugs in machine learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş
arXiv preprint arXiv:1701.04739, 2017
222017
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights
J Jacobs, S Romanosky, O Suciu, B Edwards, A Sarabi
arXiv preprint arXiv:2302.14172, 2023
112023
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
O Suciu, R Mărginean, Y Kaya, H Daumé III, T Dumitraş
arXiv preprint arXiv:1803.06975, 2018
22018
Data-Driven Techniques for Vulnerability Assessments
OP Suciu
University of Maryland, College Park, 2021
12021
Systems and methods for predicting development of functional vulnerability exploits
T Bao, C Nelson, Z Lyu, T Dumitras, O Suciu
US Patent App. 18/169,674, 2023
2023
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System
T Dumitraş, Y Kaya, R Mărginean, O Suciu
Security Protocols XXVI: 26th International Workshop, 150-162, 2018
2018
Poster: Exploring Adversarial Examples in Malware Detection
O Suciu, SE Coull, J Johns
系统目前无法执行此操作,请稍后再试。
文章 1–12