Shagufta Mehnaz

Orcid: 0000-0001-5850-4568

According to our database1, Shagufta Mehnaz authored at least 19 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Second-Order Information Matters: Revisiting Machine Unlearning for Large Language Models.
CoRR, 2024

2023
Towards Sentence Level Inference Attack Against Pre-trained Language Models.
Proc. Priv. Enhancing Technol., July, 2023

GNNBleed: Inference Attacks to Unveil Private Edges in Graphs with Realistic Access to GNN Models.
CoRR, 2023

FLTrojan: Privacy Leakage Attacks against Federated Language Models Through Selective Weight Tampering.
CoRR, 2023

FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks.
CoRR, 2023

SecureImgStego: A Keyed Shuffling-based Deep Learning Model for Secure Image Steganography.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Black-box Model Inversion Attribute Inference Attacks on Classification Models.
CoRR, 2020

Privacy-preserving Real-time Anomaly Detection Using Edge Computing.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2018
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
IEEE Trans. Mob. Comput., 2018

RWGuard: A Real-Time Detection System Against Cryptographic Ransomware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Seamless and Secure Bluetooth LE Connection Migration.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Privacy-Preserving Multi-Party Analytics over Arbitrarily Partitioned Data.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Building robust temporal user profiles for anomaly detection in file system accesses.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016


  Loading...