Alina Oprea

Orcid: 0000-0002-4979-5292

Affiliations:
  • Northeastern University, Boston, MA, USA


According to our database1, Alina Oprea authored at least 95 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SleeperNets: Universal Backdoor Poisoning Attacks Against Reinforcement Learning Agents.
CoRR, 2024

Phantom: General Trigger Attacks on Retrieval Augmented Language Generation.
CoRR, 2024

Synthesizing Tight Privacy and Accuracy Bounds via Weighted Model Counting.
CoRR, 2024

2023
Modeling self-propagating malware with epidemiological models.
Appl. Netw. Sci., December, 2023

FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning.
ACM Trans. Internet Things, August, 2023

How to Combine Membership-Inference Attacks on Multiple Updated Machine Learning Models.
Proc. Priv. Enhancing Technol., July, 2023

Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning.
ACM Comput. Surv., 2023

User Inference Attacks on Large Language Models.
CoRR, 2023

Chameleon: Increasing Label-Only Membership Leakage with Adaptive Poisoning.
CoRR, 2023

Dropout Attacks.
CoRR, 2023

TMI! Finetuned Models Leak Private Information from their Pretraining Data.
CoRR, 2023

One-shot Empirical Privacy Estimation for Federated Learning.
CoRR, 2023

Backdoor Attacks in Peer-to-Peer Federated Learning.
CoRR, 2023

SNAP: Efficient Extraction of Private Properties with Poisoning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023

Black-box Attacks Against Neural Binary Function Detection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Unleashing the Power of Randomization in Auditing Differentially Private ML.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware Classifiers.
Proceedings of the IEEE Military Communications Conference, 2023

Poisoning Network Flow Classifiers.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments.
ACM Trans. Priv. Secur., 2022

Machine Learning Security and Privacy.
IEEE Secur. Priv., 2022

SafeNet: Mitigating Data Poisoning Attacks on Private Machine Learning.
IACR Cryptol. ePrint Arch., 2022

Attacking Neural Binary Function Detection.
CoRR, 2022

CELEST: Federated Learning for Globally Coordinated Threat Detection.
CoRR, 2022

How to Combine Membership-Inference Attacks on Multiple Updated Models.
CoRR, 2022

Poisoning Attacks Against Machine Learning: Can Machine Learning Be Trustworthy?
Computer, 2022

Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems.
Proceedings of the IEEE Military Communications Conference, 2022

Bad Citrus: Reducing Adversarial Costs with Model Distances.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Cyber Network Resilience Against Self-Propagating Malware Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

Adversarial Robustness Verification and Attack Synthesis in Stochastic Systems.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Network-Level Adversaries in Federated Learning.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models.
IEEE Trans. Inf. Forensics Secur., 2021

Collaborative Information Sharing for ML-Based Threat Detection.
CoRR, 2021

On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware.
CoRR, 2021

Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.
Proceedings of the 30th USENIX Security Symposium, 2021

Extracting Training Data from Large Language Models.
Proceedings of the 30th USENIX Security Symposium, 2021

Machine Learning Integrity and Privacy in Adversarial Environments.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Living-Off-The-Land Command Detection Using Active Learning.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Private Hierarchical Clustering and Efficient Approximation.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

Subpopulation Data Poisoning Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Exploring Backdoor Poisoning Attacks Against Malware Classifiers.
CoRR, 2020

What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Auditing Differentially Private Machine Learning: How Private is Private SGD?
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

2019
Adversarial Examples for Deep Learning Cyber Security Analytics.
CoRR, 2019

The House That Knows You: User Authentication Based on IoT Data.
CoRR, 2019

On Designing Machine Learning Models for Malicious Network Traffic Classification.
CoRR, 2019

Playing Adaptively Against Stealthy Opponents: A Reinforcement Learning Strategy for the FlipIt Security Game.
CoRR, 2019

Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation.
CoRR, 2019

Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Differentially Private Fair Learning.
Proceedings of the 36th International Conference on Machine Learning, 2019

\mathsf QFlip : An Adaptive Reinforcement Learning Strategy for the \mathsf FlipIt Security Game.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

AppMine: Behavioral Analytics for Web Application Vulnerability Detection.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks.
CoRR, 2018

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

The House That Knows You: User Authentication Based on IoT Data.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Automated Generation and Selection of Interpretable Features for Enterprise Security.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

MADE: Security Analytics for Enterprise Threat Detection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Robust Linear Regression Against Training Data Poisoning.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

User-profile-based analytics for detecting cloud security breaches.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Robust High-Dimensional Linear Regression.
CoRR, 2016

MOSAIC: A Platform for Monitoring and Security Analytics in Public Clouds.
Proceedings of the IEEE Cybersecurity Development, 2016

Operational Security Log Analytics for Enterprise Breach Detection.
Proceedings of the IEEE Cybersecurity Development, 2016

Catching predators at watering holes: finding and understanding strategically compromised websites.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
An Epidemiological Study of Malware Encounters in a Large Enterprise.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

CCSW 2014: Sixth ACM Cloud Computing Security Workshop.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
FlipIt: The Game of "Stealthy Takeover".
J. Cryptol., 2013

New approaches to security and availability for cloud data.
Commun. ACM, 2013

Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Efficient software implementations of large finite fields <i>GF</i>(2<sup><i>n</i></sup>) for secure storage applications.
ACM Trans. Storage, 2012

Defending Against the Unknown Enemy: Applying FlipIt to System Security.
IACR Cryptol. ePrint Arch., 2012

Practical scrubbing: Getting to the bad sector at the right time.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Hourglass schemes: how to prove that cloud files are encrypted.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Iris: A Scalable Cloud File System with Efficient Integrity Checks.
IACR Cryptol. ePrint Arch., 2011

HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes.
IACR Cryptol. ePrint Arch., 2010

A Clean-Slate Look at Disk Scrubbing.
Proceedings of the 8th USENIX Conference on File and Storage Technologies, 2010

2009
Authentic Time-Stamps for Archival Storage.
IACR Cryptol. ePrint Arch., 2009

2008
HAIL: A High-Availability and Integrity Layer for Cloud Storage.
IACR Cryptol. ePrint Arch., 2008

Proofs of Retrievability: Theory and Implementation.
IACR Cryptol. ePrint Arch., 2008

A Pseudo-logarithmic Image Processing Framework for Edge Detection.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2008

2007
Integrity Checking in Cryptographic File Systems with Constant Trusted Storage.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Dynamic range enhancement of consumer digital camera acquired hip prosthesis X-ray images.
Proceedings of the 15th European Signal Processing Conference, 2007

2006
On Consistency of Encrypted Files.
Proceedings of the Distributed Computing, 20th International Symposium, 2006

2005
Secure Key-Updating for Lazy Revocation.
IACR Cryptol. ePrint Arch., 2005

Lazy Revocation in Cryptographic File Systems.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

Space-Efficient Block Storage Integrity.
Proceedings of the Network and Distributed System Security Symposium, 2005

2004
Securing a Remote Terminal Application with a Mobile Trusted Device.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Automatic generation of two-party computations.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003


  Loading...