Vasisht Duddu

Orcid: 0000-0003-2138-4341

According to our database1, Vasisht Duddu authored at least 19 papers between 2018 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SoK: Unintended Interactions among Machine Learning Defenses and Risks.
CoRR, 2023

Attesting Distributional Properties of Training Data for Machine Learning.
CoRR, 2023

GrOVe: Ownership Verification of Graph Neural Networks using Embeddings.
CoRR, 2023

Comprehension from Chaos: Towards Informed Consent for Private Computation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Leveraging Algorithmic Fairness to Mitigate Blackbox Attribute Inference Attacks.
CoRR, 2022

Comprehension from Chaos: What Users Understand and Expect from Private Computation.
CoRR, 2022

Towards privacy aware deep learning for embedded systems.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Inferring Sensitive Attributes from Model Explanations.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning.
CoRR, 2021

Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks.
CoRR, 2021

2020
Fault tolerance of neural networks in adversarial settings.
J. Intell. Fuzzy Syst., 2020

GECKO: Reconciling Privacy, Accuracy and Efficiency in Embedded Deep Learning.
CoRR, 2020

Towards Enhancing Fault Tolerance in Neural Networks.
Proceedings of the MobiQuitous '20: Computing, 2020

Quantifying Privacy Leakage in Graph Embedding.
Proceedings of the MobiQuitous '20: Computing, 2020

Quantifying (Hyper) Parameter Leakage in Machine Learning.
Proceedings of the 6th IEEE International Conference on Multimedia Big Data, 2020

2019
Adversarial Fault Tolerant Training for Deep Neural Networks.
CoRR, 2019

2018
Stealing Neural Networks via Timing Side Channels.
CoRR, 2018

Network and Security Analysis of Anonymous Communication Networks.
CoRR, 2018

Fuzzy Graph Modelling of Anonymous Networks.
Proceedings of the Soft Computing Applications, 2018


  Loading...