Follow
Alina Oprea
Title
Cited by
Cited by
Year
HAIL: A high-availability and integrity layer for cloud storage
KD Bowers, A Juels, A Oprea
Proceedings of the 16th ACM conference on Computer and communications …, 2009
13602009
Proofs of retrievability: Theory and implementation
KD Bowers, A Juels, A Oprea
Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009
7902009
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE symposium on security and privacy (SP), 19-35, 2018
5962018
Homealone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
2011 IEEE symposium on security and privacy, 313-328, 2011
4592011
Extracting Training Data from Large Language Models.
N Carlini, F Tramer, E Wallace, M Jagielski, A Herbert-Voss, K Lee, ...
USENIX Security Symposium 6, 2021
4332021
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda
Proceedings of the 29th annual computer security applications conference …, 2013
3402013
Detection of malicious web activity in enterprise computer networks
AM Oprea, Z Li, R Norris, KD Bowers
US Patent 9,838,407, 2017
2742017
FlipIt: The Game of “Stealthy Takeover”
M Van Dijk, A Juels, A Oprea, RL Rivest
Journal of Cryptology 26, 655-713, 2013
2692013
Iris: A scalable cloud file system with efficient integrity checks
E Stefanov, M van Dijk, A Juels, A Oprea
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2322012
Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks
A Demontis, M Melis, M Pintor, J Matthew, B Biggio, O Alina, NR Cristina, ...
28th USENIX security symposium, 321-338, 2019
2302019
New approaches to security and availability for cloud data
A Juels, A Oprea
Communications of the ACM 56 (2), 64-73, 2013
1982013
Detection of early-stage enterprise infection by mining large-scale log data
A Oprea, Z Li, TF Yen, SH Chin, S Alrwais
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
1952015
Scalable cloud file system with efficient integrity checks
EP Stefanov, ME Van Dijk, AM Oprea, A Juels
US Patent 8,706,701, 2014
1342014
Space-Efficient Block Storage Integrity.
A Oprea, MK Reiter, K Yang
NDSS, 2005
1222005
How to tell if your cloud files are vulnerable to drive crashes
KD Bowers, M Van Dijk, A Juels, A Oprea, RL Rivest
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1212011
Differentially private fair learning
M Jagielski, M Kearns, J Mao, A Oprea, A Roth, S Sharifi-Malvajerdi, ...
International Conference on Machine Learning, 3000-3008, 2019
1052019
Anomaly sensor framework for detecting advanced persistent threat attacks
TF Yen, A Juels, A Kuppa, K Onarlioglu, A Oprea
US Patent 9,378,361, 2016
992016
Hourglass schemes: how to prove that cloud files are encrypted
M Van Dijk, A Juels, A Oprea, RL Rivest, E Stefanov, N Triandopoulos
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
982012
Auditing differentially private machine learning: How private is Differentially Private SGD?
M Jagielski, J Ullman, A Oprea
Thirty-fourth Conference on Neural Information Processing Systems (NeurIPS) 2020, 2020
93*2020
Robust linear regression against training data poisoning
C Liu, B Li, Y Vorobeychik, A Oprea
Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017
932017
The system can't perform the operation now. Try again later.
Articles 1–20