Follow
Shruti Tople
Shruti Tople
Azure Research, Microsoft
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
A uror: defending against poisoning attacks in collaborative deep learning systems
S Shen, S Tople, P Saxena
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
3352016
Panoply: Low-TCB Linux Applications With SGX Enclaves.
S Shinde, D Le Tien, S Tople, P Saxena
NDSS, 2017
2852017
Domain generalization using causal matching
D Mahajan, S Tople, A Sharma
International Conference on Machine Learning, 7313-7324, 2021
2502021
A traceability analysis of monero’s blockchain
A Kumar, C Fischer, S Tople, P Saxena
European Symposium on Research in Computer Security, 153-173, 2017
2252017
Falcon: Honest-majority maliciously secure framework for private deep learning
S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin
Proceedings on Privacy Enhancing Technologies 2021 (1), 188-208, 2021
2242021
Analyzing information leakage of updates to natural language models
S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
1052020
Privado: Practical and secure DNN inference
S Tople, K Grover, S Shinde, R Bhagwan, R Ramjee
arXiv preprint arXiv:1810.00602, 2018
87*2018
Leakage of Dataset Properties in Multi-Party Machine Learning
W Zhang, S Tople, O Ohrimenko
30th {USENIX} Security Symposium ({USENIX} Security 21), 2687-2704, 2021
74*2021
Analyzing leakage of personally identifiable information in language models
N Lukas, A Salem, R Sim, S Tople, L Wutschitz, S Zanella-Béguelin
arXiv preprint arXiv:2302.00539, 2023
702023
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content
S Tople, S Shinde, Z Chen, P Saxena
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
332013
Alleviating Privacy Attacks via Causal Learning
S Tople, A Sharma, A Nori
International Conference on Machine Learning, 9537-9547, 2020
322020
Collaborative Machine Learning Markets with Data-Replication-Robust Payments
O Ohrimenko, S Tople, S Tschiatschek
arXiv preprint arXiv:1911.09052, 2019
292019
On the trade-offs in oblivious execution techniques
S Tople, P Saxena
International Conference on Detection of Intrusions and Malware, and …, 2017
292017
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
272013
Bayesian estimation of differential privacy
S Zanella-Béguelin, L Wutschitz, S Tople, A Salem, V Rühle, A Paverd, ...
arXiv preprint arXiv:2206.05199, 2022
262022
PRO-ORAM: Practical Read-Only Oblivious {RAM}
S Tople, Y Jia, P Saxena
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
23*2019
Grey-box Extraction of Natural Language Models
S Zanella-Beguelin, S Tople, A Paverd, B Köpf
International Conference on Machine Learning, 12278-12286, 2021
182021
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Y Jia, T Moataz, S Tople, P Saxena
USENIX Security Symposium, 945-962, 2016
182016
SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning
A Salem, G Cherubin, D Evans, B Köpf, A Paverd, A Suri, S Tople, ...
arXiv preprint arXiv:2212.10986, 2022
162022
Podarch: Protecting legacy applications with a purely hardware tcb
S Shinde, S Tople, D Kathayat, P Saxena
National University of Singapore, Tech. Rep, 2015
162015
The system can't perform the operation now. Try again later.
Articles 1–20