Follow
Alina Oprea
Title
Cited by
Cited by
Year
Extracting training data from large language models
N Carlini, F Tramer, E Wallace, M Jagielski, A Herbert-Voss, K Lee, ...
30th USENIX Security Symposium (USENIX Security 21), 2633-2650, 2021
17802021
HAIL: A high-availability and integrity layer for cloud storage
KD Bowers, A Juels, A Oprea
Proceedings of the 16th ACM conference on Computer and communications …, 2009
14562009
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE symposium on security and privacy (SP), 19-35, 2018
10192018
Proofs of retrievability: Theory and implementation
KD Bowers, A Juels, A Oprea
Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009
8342009
Homealone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
2011 IEEE symposium on security and privacy, 313-328, 2011
4902011
Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks
A Demontis, M Melis, M Pintor, M Jagielski, B Biggio, A Oprea, ...
28th USENIX security symposium (USENIX security 19), 321-338, 2019
4812019
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda
Proceedings of the 29th annual computer security applications conference …, 2013
4122013
FlipIt: The Game of “Stealthy Takeover”
M Van Dijk, A Juels, A Oprea, RL Rivest
Journal of Cryptology 26, 655-713, 2013
3402013
Detection of malicious web activity in enterprise computer networks
AM Oprea, Z Li, R Norris, KD Bowers
US Patent 9,838,407, 2017
3142017
Iris: A scalable cloud file system with efficient integrity checks
E Stefanov, M van Dijk, A Juels, A Oprea
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2522012
Detection of early-stage enterprise infection by mining large-scale log data
A Oprea, Z Li, TF Yen, SH Chin, S Alrwais
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
2392015
Auditing differentially private machine learning: How private is Differentially Private SGD?
M Jagielski, J Ullman, A Oprea
Thirty-fourth Conference on Neural Information Processing Systems (NeurIPS) 2020, 2020
236*2020
New approaches to security and availability for cloud data
A Juels, A Oprea
Communications of the ACM 56 (2), 64-73, 2013
2102013
Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
G Severi, J Meyer, S Coull, A Oprea
30th USENIX Security Symposium (USENIX Security 21), 1487-1504, 2021
1992021
Differentially private fair learning
M Jagielski, M Kearns, J Mao, A Oprea, A Roth, S Sharifi-Malvajerdi, ...
International Conference on Machine Learning, 3000-3008, 2019
1832019
Scalable cloud file system with efficient integrity checks
EP Stefanov, ME Van Dijk, AM Oprea, A Juels
US Patent 8,706,701, 2014
1682014
How to tell if your cloud files are vulnerable to drive crashes
KD Bowers, M Van Dijk, A Juels, A Oprea, RL Rivest
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1332011
Space-Efficient Block Storage Integrity.
A Oprea, MK Reiter, K Yang
NDSS, 2005
1312005
Subpopulation data poisoning attacks
M Jagielski, G Severi, N Pousette Harger, A Oprea
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
1262021
Robust linear regression against training data poisoning
C Liu, B Li, Y Vorobeychik, A Oprea
Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017
1262017
The system can't perform the operation now. Try again later.
Articles 1–20