Varun Chandrasekaran

According to our database1, Varun Chandrasekaran authored at least 39 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bypassing LLM Watermarks with Color-Aware Substitutions.
CoRR, 2024

Designing Informative Metrics for Few-Shot Example Selection.
CoRR, 2024

2023
Privately Aligning Language Models with Reinforcement Learning.
CoRR, 2023

KITAB: Evaluating LLMs on Constraint Satisfaction for Information Retrieval.
CoRR, 2023

Why Train More? Effective and Efficient Membership Inference via Memorization.
CoRR, 2023

Diversity of Thought Improves Reasoning Abilities of Large Language Models.
CoRR, 2023

Teaching Language Models to Hallucinate Less with Synthetic Tasks.
CoRR, 2023

Attention Satisfies: A Constraint-Satisfaction Lens on Factual Errors of Language Models.
CoRR, 2023

Sparks of Artificial General Intelligence: Early experiments with GPT-4.
CoRR, 2023

Proof-of-Learning is Currently More Broken Than You Think.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Verifiable and Provably Secure Machine Unlearning.
CoRR, 2022

On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning.
CoRR, 2022

Generative Extraction of Audio Classifiers for Speaker Identification.
CoRR, 2022

Hierarchical Federated Learning with Privacy.
CoRR, 2022

CONFIDANT: A Privacy Controller for Social Robots.
Proceedings of the ACM/IEEE International Conference on Human-Robot Interaction, 2022

Unrolling SGD: Understanding Factors Influencing Machine Unlearning.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Face-Off: Adversarial Face Obfuscation.
Proc. Priv. Enhancing Technol., 2021

SoK: Machine Learning Governance.
CoRR, 2021

On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples.
CoRR, 2021

Causally Constrained Data Synthesis for Private Data Release.
CoRR, 2021

Entangled Watermarks as a Defense against Model Extraction.
Proceedings of the 30th USENIX Security Symposium, 2021

Proof-of-Learning: Definitions and Practice.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Machine Unlearning.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

PowerCut and Obfuscator: An Exploration of the Design Space for Privacy-Preserving Interventions for Smart Speakers.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

A General Framework For Detecting Anomalous Inputs to DNN Classifiers.
Proceedings of the 38th International Conference on Machine Learning, 2021

Fourth International Workshop on Dependable and Secure Machine Learning - DSML 2021.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2020
Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers.
CoRR, 2020

Face-Off: Adversarial Face Obfuscation.
CoRR, 2020

On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping.
CoRR, 2020

Exploring Connections Between Active Learning and Model Extraction.
Proceedings of the 29th USENIX Security Symposium, 2020

Third International Workshop on Dependable and Secure Machine Learning - DSML 2020.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

2019
Generating Semantic Adversarial Examples with Differentiable Rendering.
CoRR, 2019

Enhancing ML Robustness Using Physical-World Constraints.
CoRR, 2019

A Framework for Analyzing Spectrum Characteristics in Large Spatio-temporal Scales.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

2018
Characterizing Privacy Perceptions of Voice Assistants: A Technology Probe Study.
CoRR, 2018

Model Extraction and Active Learning.
CoRR, 2018

Traversing the Quagmire that is Privacy in your Smart Home.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

2016
Secure Mobile Identities.
CoRR, 2016

Alphacodes: Usable, Secure Transactions with Untrusted Providers using Human Computable Puzzles.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016


  Loading...