All Publications
2024
- Self-Supervised Fine-Tuning of Automatic Speech Recognition Systems against Signal Processing Attacks [PDF (ACM DL)]In ACM Asia Conference on Computer and Communications Security (2024)
- Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments [PDF]In ACM Conference on Data and Application Security and Privacy (2024)
2023
- DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning [PDF]In Neural Information Processing Systems (2023)
- SoK: Memorization in General-Purpose Large Language Models [PDF]In arXiv preprint (2023)
- EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference [PDF (External Link)]In ACM Conference on Security and Privacy in Wireless and Mobile Networks (2023)
2022
- Enhanced Membership Inference Attacks against Machine Learning Models [PDF]In ACM SIGSAC Conference on Computer and Communications Security (2022)
- PermPress: Machine Learning-Based Pipeline to Evaluate Permissions in App Privacy Policies [PDF (External Link)]In IEEE Access (2022)
- Digital Watermarking for Detecting Malicious Intellectual Property Cores in NoC Architectures [PDF (External Link)]In IEEE Transactions on Very Large Scale Integration (VLSI) Systems (2022)
- Analyzing the Monetization Ecosystem of Stalkerware [PDF]In Privacy Enhancing Technologies Symposium (2022)
- Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds [PDF]In Privacy Enhancing Technologies Symposium (2022)