Mika Juuti

According to our database1, Mika Juuti authored at least 16 papers between 2015 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A little goes a long way: Improving toxic language classification despite data scarcity.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

2019
Extraction of Complex DNN Models: Real Threat or Boogeyman?
CoRR, 2019

PRADA: Protecting Against DNN Model Stealing Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Making Targeted Black-box Evasion Attacks Effective and Efficient.
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019

2018
Stochastic discriminant analysis for linear supervised dimension reduction.
Neurocomputing, 2018

All You Need is "Love": Evading Hate-speech Detection.
CoRR, 2018

PRADA: Protecting against DNN Model Stealing Attacks.
CoRR, 2018

Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews.
Proceedings of the Computer Security, 2018

All You Need is: Evading Hate Speech Detection.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

2017
Oblivious Neural Network Predictions via MiniONN transformations.
IACR Cryptol. ePrint Arch., 2017

STASH: Securing Transparent Authentication Schemes Using Prover-Side Proximity Verification.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

2016
TRec: Relay-Resilient Transparent Authentication using Trajectory Recognition.
CoRR, 2016

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Stochastic Discriminant Analysis.
Proceedings of the 2015 International Joint Conference on Neural Networks, 2015


  Loading...