User profiles for Saurabh Shintre
Saurabh ShintreFounder, Realm Labs Verified email at realmlabs.ai Cited by 1812 |
Detecting adversarial samples from artifacts
Deep neural networks (DNNs) are powerful nonlinear architectures that are known to be
robust to random perturbations of the input. However, these models are vulnerable to …
robust to random perturbations of the input. However, these models are vulnerable to …
{SEAL}: Attack mitigation for encrypted databases via adjustable leakage
Building expressive encrypted databases that can scale to large volumes of data while enjoying
formal security guarantees has been one of the holy grails of security and cryptography …
formal security guarantees has been one of the holy grails of security and cryptography …
Examining the adoption and abandonment of security, privacy, and identity theft protection practices
Users struggle to adhere to expert-recommended security and privacy practices. While prior
work has studied initial adoption of such practices, little is known about the subsequent …
work has studied initial adoption of such practices, little is known about the subsequent …
Malware makeover: Breaking ml-based static analysis by modifying executable bytes
Motivated by the transformative impact of deep neural networks (DNNs) in various domains,
researchers and anti-virus vendors have proposed DNNs for malware detection from raw …
researchers and anti-virus vendors have proposed DNNs for malware detection from raw …
An information-theoretic approach to side-channel analysis
S Shintre - 2015 - search.proquest.com
Side-channels are unanticipated information flows that present a significant threat to security
of systems. Quantitative analyses are required to measure the rate of information leakage …
of systems. Quantitative analyses are required to measure the rate of information leakage …
Making machine learning forget
Abstract Machine learning models often overfit to the training data and do not learn general
patterns like humans do. This allows an attacker to learn private membership or attributes …
patterns like humans do. This allows an attacker to learn private membership or attributes …
How feasible is network coding in current satellite systems?
The benefits of network coding in terms of throughput, security and robustness are well
understood for a large class of networks, such as wireless mesh networks and peer-to-peer …
understood for a large class of networks, such as wireless mesh networks and peer-to-peer …
Probabilistic key distribution in vehicular networks with infrastructure support
We propose a probabilistic key distribution protocol for vehicular network that alleviates the
burden of traditional public-key infrastructures. Roadside units act as trusted nodes and are …
burden of traditional public-key infrastructures. Roadside units act as trusted nodes and are …
Generalized delay-secrecy-throughput trade-offs in mobile ad-hoc networks
In this paper, we first present a theoretical framework aimed at generalizing the scaling laws
of delay, secrecy and throughput in mobile ad-hoc networks for various network models and …
of delay, secrecy and throughput in mobile ad-hoc networks for various network models and …
Gradient similarity: An explainable approach to detect adversarial attacks against deep learning
J Dhaliwal, S Shintre - arXiv preprint arXiv:1806.10707, 2018 - arxiv.org
Deep neural networks are susceptible to small-but-specific adversarial perturbations capable
of deceiving the network. This vulnerability can lead to potentially harmful consequences …
of deceiving the network. This vulnerability can lead to potentially harmful consequences …