Atul Prakash

Orcid: 0000-0002-4907-3687

Affiliations:
  • University of Michigan, Department of Electrical Engineering and Computer Science, Ann Arbor, MI, USA
  • University of California, Berkeley, CA, USA (PhD)


According to our database1, Atul Prakash authored at least 157 papers between 1984 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails.
CoRR, 2024

Adaptive Skeleton Graph Decoding.
CoRR, 2024

Learn To be Efficient: Build Structured Sparsity in Large Language Models.
CoRR, 2024

D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

2023
Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation.
CoRR, 2023

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks.
CoRR, 2023

CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception.
CoRR, 2023

Investigating Stateful Defenses Against Black-Box Adversarial Examples.
CoRR, 2023

Concept-based Explanations for Out-of-Distribution Detectors.
Proceedings of the International Conference on Machine Learning, 2023

Coverage-centric Coreset Selection for High Pruning Rates.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Dispelling Misconceptions and Characterizing the Failings of Deepfake Detection.
IEEE Secur. Priv., 2022

Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing.
CoRR, 2022

Towards Adversarially Robust Deepfake Detection: An Ensemble Approach.
CoRR, 2022

A Large-scale Investigation into Geodifferences in Mobile Apps.
Proceedings of the 31st USENIX Security Symposium, 2022

GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Simple Run-Time Infrastructure (SRTI): An accessible distributed computing platform for interdisciplinary simulation.
J. Comput. Sci., 2021

Perspectives on the SolarWinds Incident.
IEEE Secur. Priv., 2021

Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples.
CoRR, 2021

Protecting DNNs from Theft using an Ensemble of Diverse Models.
Proceedings of the 9th International Conference on Learning Representations, 2021

MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Essential Features: Reducing the Attack Surface of Adversarial Perturbations with Robust Content-Aware Image Preprocessing.
CoRR, 2020

Understanding and Diagnosing Vulnerability under Adversarial Attacks.
CoRR, 2020

Towards Robustness against Unsuspicious Adversarial Examples.
CoRR, 2020

Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification.
CoRR, 2020

Security Analysis of Unified Payments Interface and Payment Apps in India.
Proceedings of the 29th USENIX Security Symposium, 2020

Efficient Adversarial Training With Transferable Adversarial Examples.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
Can Attention Masks Improve Adversarial Robustness?
CoRR, 2019

Transferable Adversarial Robustness using Adversarially Trained Autoencoders.
CoRR, 2019

Analyzing the Interpretability Robustness of Self-Explaining Models.
CoRR, 2019

Robust Classification using Robust Feature Augmentation.
CoRR, 2019

Beware of the App! On the Vulnerability Surface of Smart Devices through their Companion Apps.
CoRR, 2019

A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Open Source Vulnerability Notification.
Proceedings of the Open Source Systems - 15th IFIP WG 2.13 International Conference, 2019

2018
Designing Adversarially Resilient Classifiers using Resilient Feature Engineering.
CoRR, 2018

Securing IoT Apps with Fine-grained Control of Information Flows.
CoRR, 2018

Tyche: Risk-Based Permissions for Smart Home Platforms.
CoRR, 2018

Physical Adversarial Examples for Object Detectors.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Tyche: A Risk-Based Permission Model for Smart Homes.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Decentralized Action Integrity for Trigger-Action IoT Platforms.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Robust Physical-World Attacks on Deep Learning Visual Classification.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
Security Implications of Permission Models in Smart-Home Application Frameworks.
IEEE Secur. Priv., 2017

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
IEEE Secur. Priv., 2017

Note on Attacking Object Detectors with Adversarial Stickers.
CoRR, 2017

IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks.
CoRR, 2017

Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things.
CoRR, 2017

Robust Physical-World Attacks on Machine Learning Models.
CoRR, 2017

Ensuring Authorized Updates in Multi-user Database-Backed Applications.
Proceedings of the 26th USENIX Security Symposium, 2017

ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Heimdall: A Privacy-Respecting Implicit Preference Collection Framework.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
SenStore: A Scalable Cyberinfrastructure Platform for Implementation of Data-to-Decision Frameworks for Infrastructure Health Management.
J. Comput. Civ. Eng., 2016

FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
Proceedings of the 25th USENIX Security Symposium, 2016

Security Analysis of Emerging Smart Home Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications.
Proceedings of the IEEE Cybersecurity Development, 2016

Android UI Deception Revisited: Attacks and Defenses.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Context-Aware Framework for Highway Bridge Inspections.
J. Comput. Civ. Eng., 2015

Practical Always-on Taint Tracking on Mobile Devices.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Decomposable Trust for Android Applications.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services.
Int. J. Next Gener. Comput., 2014

Anception: Application Virtualization For Android.
CoRR, 2014

Cloud computing data capsules for non-consumptiveuse of texts.
Proceedings of the ScienceCloud'14, 2014

OASIS: Operational Access Sandboxes for Information Security.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2013
The Confinement Problem: 40 Years Later.
J. Inf. Process. Syst., 2013

Let the Right One in: Discovering and Mitigating Permission Gaps.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Expose: Discovering Potential Binary Code Re-use.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
Security in sensor network based SCADA system for adaptive traffic signal operation.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Adaptive semi-private email aliases.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Accessing Trusted Web Sites from Low-Integrity Systems without End-Host Snooping.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Distilling critical attack graph surface iteratively through minimum-cost SAT solving.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Bringing the field into the lab: supporting capture and replay of contextual data for the design of context-aware applications.
Proceedings of the 23rd Annual ACM Symposium on User Interface Software and Technology, 2010

A Study on Latent Vulnerabilities.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Fighting Phishing with Trusted Email.
Proceedings of the ARES 2010, 2010

2009
Location-Aware Computing, Virtual Networks.
IEEE Pervasive Comput., 2009

Protecting Confidential Data on Personal Computers with Storage Capsules.
Proceedings of the 18th USENIX Security Symposium, 2009

Quantifying Information Leaks in Outbound Web Traffic.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Ensemble: Community-Based Anomaly Detection for Popular Applications.
Proceedings of the Security and Privacy in Communication Networks, 2009

2008
Distributed and Collaborative Development.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Large-Scale Group Collaboration Systems.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Towards Quantification of Network-Based Information Leaks via HTTP.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Analyzing websites for user-visible security design flaws.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers.
Proceedings of the Middleware 2008, 2008

Social networks and context-aware spam.
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 2008

2007
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments.
J. Networks, 2007

Using a virtual machine to protect sensitive Grid resources.
Concurr. Comput. Pract. Exp., 2007

Securing Network Input via a Trusted Input Proxy.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

OpenFire: Using deception to reduce network attacks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Security in Practice - Security-Usability Chasm.
Proceedings of the Information Systems Security, Third International Conference, 2007

Spector: Automatically Analyzing Shell Code.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Methods and limitations of security policy reconciliation.
ACM Trans. Inf. Syst. Secur., 2006

Enforcing provisioning and authorization policy in the Antigone system.
J. Comput. Secur., 2006

Siren: Catching Evasive Malware (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Designing a Publish-Subscribe Substrate for Privacy/Security in Pervasive Environments.
Proceedings of the ACS/IEEE International Conference on Pervasive Services 2006, 2006

Securing sensitive content in a view-only file system.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

Introduction to the talking points project.
Proceedings of the 8th International ACM SIGACCESS Conference on Computers and Accessibility, 2006

2005
Towards Protecting Sensitive Files in a Compromised System.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

FACE: A Firewall Analysis and Configuration Engine.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

WSF: An HTTP-Level Firewall for Hardening Web Servers.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

SVGrid: a secure virtual environment for untrusted grid applications.
Proceedings of the 3rd international workshop on Middleware for grid computing, 2005

CPOL: high-performance policy evaluation.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Web tap: detecting covert web traffic.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Persistent connectivity and Reliable Message Delivery in Component-based Mobile Applications.
Proceedings of the Mobile and Wireless Communications Networks, 2003

A Flexible Architecture for Security Policy Enforcement.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Source Authentication in Group Communication Systems.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2001
DACIA: A Mobile Component Framework for Buildinh Adaptive Distributed Applications.
ACM SIGOPS Oper. Syst. Rev., 2001

Secure Distribution of Events in Content-Based Publish Subscribe Systems.
Proceedings of the 10th USENIX Security Symposium, 2001

2000
Developing adaptive groupware applications using a mobile component framework.
Proceedings of the CSCW 2000, 2000

1999
Data Management Issues and Trade-Offs in CSCW Systems.
IEEE Trans. Knowl. Data Eng., 1999

Flexible Control of Downloaded Executable Content.
ACM Trans. Inf. Syst. Secur., 1999

Software Architecture for the UARC Web-Based Collaboratory.
IEEE Internet Comput., 1999

Antigone: A Flexible Framework for Secure Group Communication.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Stateful Group Communication Services.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

The Case for Better Throughput Estimation.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

1998
Concurrency Control and View Notification Algorithms for Collaborative Replicated Objects.
IEEE Trans. Computers, 1998

The Upper Atmospheric Research Collaboratory (UARC).
Interactions, 1998

Tolerating Client and Communication Failures in Distributed Groupware Systems.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Adaptive group communication services for groupware systems.
Proceedings of the Second International Enterprise Distributed Object Computing Workshop, 1998

1997
Providing Flexible Services for Managing Shared State in Collaborative Systems.
Proceedings of the Fifth European Conference on Computer Supported Cooperative Work, 1997

1996
A Query Algebra for Program Databases.
IEEE Trans. Software Eng., 1996

Building Systems That Flexibly Download Executable Content.
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996

A Protocol Composition-Based Approach to QoS Control in Collaboration Systems.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996

A Flexible Architecture for Integrating Heterogeneous Media on Replayable Workspaces.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996

Supporting Multi-User, Multi-Applet Workspaces in CBE.
Proceedings of the CSCW '96, 1996

Corona: A Communication Service for Scalable, Reliable Group Collaboration Systems.
Proceedings of the CSCW '96, 1996

1995
Program view generation and change analysis using attributed dependency graphs.
J. Softw. Maintenance Res. Pract., 1995

Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems.
Proceedings of the SEKE'95, 1995

Requirements of role-based access control for collaborative systems.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

Dealing with Synchronization and Timing Variability in the Playback of Interactive Session Recordings.
Proceedings of the Third ACM International Conference on Multimedia '95, 1995

Computer Supported Cooperative Work: New Challenges or Old Problems (Panel).
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

Management and utilization of knowledge for the automatic improvement of workflow performance.
Proceedings of the Conference on Organizational Computing Systems, 1995

The Session Capture and Replay Paradigm for Asynchronous Collaboration.
Proceedings of the Fourth European Conference on Computer Supported Cooperative Work, 1995

Implementation of a discretionary access control model for script-based systems.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
A Framework for Source Code Search Using Program Patterns.
IEEE Trans. Software Eng., 1994

A Framework for Undoing Actions in Collaborative Systems.
ACM Trans. Comput. Hum. Interact., 1994

Supporting Queries on Source Code: a Formal Framework.
Int. J. Softw. Eng. Knowl. Eng., 1994

Investigating Reverse Engineering Technologies for the CAS Program Understanding Project.
IBM Syst. J., 1994

Protocols for Integrated Audio and Shared Windows in Collaborative Systems.
Proceedings of the Second ACM International Conference on Multimedia '94, 1994

Object data models to support source code queries: implementing SCA within REFINE.
Proceedings of the Proceedings 1994 IEEE 3rd Workshop on Program Comprehension, 1994

A Framework for Automatic Improvement of Workflows to Meet Performance Goals.
Proceedings of the Sixth International Conference on Tools with Artificial Intelligence, 1994

Querying Source Code Using an Algebraic Query Language.
Proceedings of the International Conference on Software Maintenance, 1994

DistView: Support for Building Efficient Collaborative Applications Using Replicated Objects.
Proceedings of the CSCW '94, 1994

The upper atmospheric research collaboratory.
Proceedings of the Conference on Human Factors in Computing Systems, 1994

Support for the File System Security Requirements of Computational E-Mail Systems.
Proceedings of the CCS '94, 1994

1993
Issues in the Design of a Toolkit for Supporting Multiple Group Editors.
Comput. Syst., 1993

BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems.
Proceedings of the SEKE'93, 1993

Generating programming language-based pattern matchers.
Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, 1993

1992
Undoing Actions in Collaborative Work.
Proceedings of the CSCW '92, Proceedings of the Conference on Computer Supported Cooperative Work, Toronto, Canada, October 31, 1992

Design Considerations in Choosing Operations for Building Groupware Systems.
Proceedings of the CSCW 1992 Tools and Technologies Workshop, 1992

1991
Theories and techniques of program understanding.
Proceedings of the 1991 Conference of the Centre for Advanced Studies on Collaborative Research, 1991

Filter: an algorithm for reducing cascaded rollbacks in optimistic distributed simulations.
Proceedings of the Proceedings 24th Annual Simulation Symposium (ANSS-24 1991), 1991

1990
The Evolution Support Environment System.
IEEE Trans. Software Eng., 1990

DistEdit: A Distributed Toolkit for Supporting Multiple Group Editors.
Proceedings of the CSCW '90, 1990

1988
Support for Reusability in Genesis.
IEEE Trans. Software Eng., 1988

Hierarchical Distributed Simulations.
Proceedings of the 8th International Conference on Distributed Computing Systems, 1988

1987
Issues in the Development of Large, Distributed, and Reliable Software.
Adv. Comput., 1987

1986
Programming in the Large.
IEEE Trans. Software Eng., 1986

1984
Software Engineering: Problems and Perspectives.
Computer, 1984


  Loading...