Obserwuj
Alina Oprea
Tytuł
Cytowane przez
Cytowane przez
Rok
HAIL: A high-availability and integrity layer for cloud storage
KD Bowers, A Juels, A Oprea
Proceedings of the 16th ACM conference on Computer and communications …, 2009
13562009
Proofs of retrievability: Theory and implementation
KD Bowers, A Juels, A Oprea
Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009
7672009
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE Symposium on Security and Privacy (SP), 19-35, 2018
4752018
Homealone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
2011 IEEE symposium on security and privacy, 313-328, 2011
4552011
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda
Proceedings of the 29th annual computer security applications conference …, 2013
3232013
Extracting training data from large language models
N Carlini, F Tramer, E Wallace, M Jagielski, A Herbert-Voss, K Lee, ...
30th USENIX Security Symposium (USENIX Security 21), 2633-2650, 2021
2702021
FlipIt: The game of “stealthy takeover”
M Van Dijk, A Juels, A Oprea, RL Rivest
Journal of Cryptology 26 (4), 655-713, 2013
2542013
Iris: A scalable cloud file system with efficient integrity checks
E Stefanov, M van Dijk, A Juels, A Oprea
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2302012
Detection of malicious web activity in enterprise computer networks
AM Oprea, Z Li, R Norris, KD Bowers
US Patent 9,838,407, 2017
2262017
New approaches to security and availability for cloud data
A Juels, A Oprea
Communications of the ACM 56 (2), 64-73, 2013
1982013
Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks
A Demontis, M Melis, M Pintor, M Jagielski, B Biggio, A Oprea, ...
28th USENIX security symposium (USENIX security 19), 321-338, 2019
1882019
Detection of early-stage enterprise infection by mining large-scale log data
A Oprea, Z Li, TF Yen, SH Chin, S Alrwais
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
1752015
Space-Efficient Block Storage Integrity.
A Oprea, MK Reiter, K Yang
NDSS, 2005
1222005
How to tell if your cloud files are vulnerable to drive crashes
KD Bowers, M Van Dijk, A Juels, A Oprea, RL Rivest
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1212011
Scalable cloud file system with efficient integrity checks
EP Stefanov, ME Van Dijk, AM Oprea, A Juels
US Patent 8,706,701, 2014
1152014
Hourglass schemes: how to prove that cloud files are encrypted
M Van Dijk, A Juels, A Oprea, RL Rivest, E Stefanov, N Triandopoulos
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
952012
Anomaly sensor framework for detecting advanced persistent threat attacks
TF Yen, A Juels, A Kuppa, K Onarlioglu, A Oprea
US Patent 9,378,361, 2016
902016
Differentially private fair learning
M Jagielski, M Kearns, J Mao, A Oprea, A Roth, S Sharifi-Malvajerdi, ...
International Conference on Machine Learning, 3000-3008, 2019
872019
Secure key-updating for lazy revocation
M Backes, C Cachin, A Oprea
European Symposium on Research in Computer Security, 327-346, 2006
822006
Securing a remote terminal application with a mobile trusted device
A Oprea, D Balfanz, G Durfee, DK Smetters
20th Annual Computer Security Applications Conference, 438-447, 2004
782004
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20