User profiles for Saurabh Shintre

Saurabh Shintre

Founder, Realm Labs
Verified email at realmlabs.ai
Cited by 1812

Detecting adversarial samples from artifacts

R Feinman, RR Curtin, S Shintre… - arXiv preprint arXiv …, 2017 - arxiv.org
Deep neural networks (DNNs) are powerful nonlinear architectures that are known to be
robust to random perturbations of the input. However, these models are vulnerable to …

{SEAL}: Attack mitigation for encrypted databases via adjustable leakage

…, D Papadopoulos, C Papamanthou, S Shintre - 29th USENIX security …, 2020 - usenix.org
Building expressive encrypted databases that can scale to large volumes of data while enjoying
formal security guarantees has been one of the holy grails of security and cryptography …

Examining the adoption and abandonment of security, privacy, and identity theft protection practices

Y Zou, K Roundy, A Tamersoy, S Shintre… - Proceedings of the …, 2020 - dl.acm.org
Users struggle to adhere to expert-recommended security and privacy practices. While prior
work has studied initial adoption of such practices, little is known about the subsequent …

Malware makeover: Breaking ml-based static analysis by modifying executable bytes

…, M Sharif, L Bauer, MK Reiter, S Shintre - Proceedings of the 2021 …, 2021 - dl.acm.org
Motivated by the transformative impact of deep neural networks (DNNs) in various domains,
researchers and anti-virus vendors have proposed DNNs for malware detection from raw …

An information-theoretic approach to side-channel analysis

S Shintre - 2015 - search.proquest.com
Side-channels are unanticipated information flows that present a significant threat to security
of systems. Quantitative analyses are required to measure the rate of information leakage …

Making machine learning forget

S Shintre, KA Roundy, J Dhaliwal - … and Policy: 7th Annual Privacy Forum …, 2019 - Springer
Abstract Machine learning models often overfit to the training data and do not learn general
patterns like humans do. This allows an attacker to learn private membership or attributes …

How feasible is network coding in current satellite systems?

F Vieira, S Shintre, J Barros - 2010 5th Advanced Satellite …, 2010 - ieeexplore.ieee.org
The benefits of network coding in terms of throughput, security and robustness are well
understood for a large class of networks, such as wireless mesh networks and peer-to-peer …

Probabilistic key distribution in vehicular networks with infrastructure support

J Almeida, S Shintre, M Boban… - 2012 IEEE Global …, 2012 - ieeexplore.ieee.org
We propose a probabilistic key distribution protocol for vehicular network that alleviates the
burden of traditional public-key infrastructures. Roadside units act as trusted nodes and are …

Generalized delay-secrecy-throughput trade-offs in mobile ad-hoc networks

S Shintre, L Sassatelli, J Barros - 2011 IEEE-APS Topical …, 2011 - ieeexplore.ieee.org
In this paper, we first present a theoretical framework aimed at generalizing the scaling laws
of delay, secrecy and throughput in mobile ad-hoc networks for various network models and …

Gradient similarity: An explainable approach to detect adversarial attacks against deep learning

J Dhaliwal, S Shintre - arXiv preprint arXiv:1806.10707, 2018 - arxiv.org
Deep neural networks are susceptible to small-but-specific adversarial perturbations capable
of deceiving the network. This vulnerability can lead to potentially harmful consequences …