Amrita Roy Chowdhury

Affiliations:
  • University of Wisconsin-Madison, Madison, WI, USA


According to our database1, Amrita Roy Chowdhury authored at least 25 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FairProof : Confidential and Certifiable Fairness for Neural Networks.
CoRR, 2024

2023
Identifying and Mitigating the Security Risks of Generative AI.
Found. Trends Priv. Secur., 2023

Identifying and Mitigating the Security Risks of Generative AI.
CoRR, 2023

Can Membership Inferencing be Refuted?
CoRR, 2023

ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Robustness of Locally Differentially Private Graph Analysis Against Poisoning.
CoRR, 2022

Privacy Implications of Shuffling.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Forgeability and Membership Inference Attacks.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

EIFFeL: Ensuring Integrity for Federated Learning.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Strengthening Order Preserving Encryption with Differential Privacy.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
A Shuffling Framework for Local Differential Privacy.
CoRR, 2021

Kalεido: Real-Time Privacy Control for Eye-Tracking Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

Data Privacy in Trigger-Action Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Data Privacy in Trigger-Action IoT Systems.
CoRR, 2020

Intertwining Order Preserving Encryption and Differential Privacy.
CoRR, 2020

Preech: A System for Privacy-Preserving Speech Transcription.
Proceedings of the 29th USENIX Security Symposium, 2020

Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers.
Proceedings of the 2020 International Conference on Management of Data, 2020

Concise Explanations of Neural Networks using Adversarial Training.
Proceedings of the 37th International Conference on Machine Learning, 2020

Data-Dependent Differentially Private Parameter Learning for Directed Graphical Models.
Proceedings of the 37th International Conference on Machine Learning, 2020

2019
Prεεch: A System for Privacy-Preserving Speech Transcription.
CoRR, 2019

Outis: Crypto-Assisted Differential Privacy on Untrusted Servers.
CoRR, 2019

2018
PPU: Privacy-Aware Purchasing Unit for Residential Customers in Smart Electric Grids.
Proceedings of the 31st International Conference on VLSI Design and 17th International Conference on Embedded Systems, 2018

Public Order Preserving Cipher Generation Scheme for Distributed Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2015
LMAC: A Lightweight Message Authentication Code for Wireless Sensor Network.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network.
Proceedings of the 5th International Conference on Ambient Systems, 2014


  Loading...