What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Alina Oprea
Google Scholar
42
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
CELEST: Federated Learning for Globally Coordinated Threat Detection.
Talha Ongun
Simona Boboila
Alina Oprea
Tina Eliassi-Rad
Jason Hiser
Jack W. Davidson
2024
journals/popets
TMI! Finetuned Models Leak Private Information from their Pretraining Data.
John Abascal
Stanley Wu
Alina Oprea
Jonathan R. Ullman
2024
conf/sp
Dropout Attacks.
Andrew Yuan
Alina Oprea
Cheng Tan
2023
journals/popets
How to Combine Membership-Inference Attacks on Multiple Updated Machine Learning Models.
Matthew Jagielski
Stanley Wu
Alina Oprea
Jonathan R. Ullman
Roxana Geambasu
2023
conf/sp
SNAP: Efficient Extraction of Private Properties with Poisoning.
Harsh Chaudhari
John Abascal
Alina Oprea
Matthew Jagielski
Florian Tramèr
Jonathan R. Ullman
2023
conf/acsac
Poisoning Network Flow Classifiers.
Giorgio Severi
Simona Boboila
Alina Oprea
John T. Holodnak
Kendra Kratkiewicz
Jason Matterer
2022
conf/esorics
Cyber Network Resilience Against Self-Propagating Malware Attacks.
Alesia Chernikova
Nicolò Gozzi
Simona Boboila
Priyanka Angadi
John Loughner
Matthew Wilden
Nicola Perra
Tina Eliassi-Rad
Alina Oprea
2022
conf/cns
Network-Level Adversaries in Federated Learning.
Giorgio Severi
Matthew Jagielski
Gökberk Yar
Yuxuan Wang
Alina Oprea
Cristina Nita-Rotaru
2022
conf/acsac
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices.
Afsah Anwar
Yi Hui Chen
Roy Hodgman
Tom Sellers
Engin Kirda
Alina Oprea
2021
journals/tifs
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models.
Jialin Wen
Benjamin Zi Hao Zhao
Minhui Xue
Alina Oprea
Haifeng Qian
2021
conf/ccs
Subpopulation Data Poisoning Attacks.
Matthew Jagielski
Giorgio Severi
Niklas Pousette Harger
Alina Oprea
2021
conf/uss
Extracting Training Data from Large Language Models.
Nicholas Carlini
Florian Tramèr
Eric Wallace
Matthew Jagielski
Ariel Herbert-Voss
Katherine Lee
Adam Roberts
Tom B. Brown
Dawn Song
Úlfar Erlingsson
Alina Oprea
Colin Raffel
2021
conf/uss
Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.
Giorgio Severi
Jim Meyer
Scott E. Coull
Alina Oprea
2021
conf/ccsw-ws
Private Hierarchical Clustering and Efficient Approximation.
Xianrui Meng
Dimitrios Papadopoulos
Alina Oprea
Nikos Triandopoulos
2021
conf/cns
PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection.
Talha Ongun
Oliver Spohngellert
Benjamin A. Miller
Simona Boboila
Alina Oprea
Tina Eliassi-Rad
Jason Hiser
Alastair Nottingham
Jack W. Davidson
Malathi Veeraraghavan
2019
conf/ccs
AppMine: Behavioral Analytics for Web Application Vulnerability Detection.
Indranil Jana
Alina Oprea
2019
conf/uss
Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks.
Ambra Demontis
Marco Melis
Maura Pintor
Matthew Jagielski
Battista Biggio
Alina Oprea
Cristina Nita-Rotaru
Fabio Roli
2019
conf/sp
Are Self-Driving Cars Secure? Evasion Attacks Against Deep Neural Networks for Steering Angle Prediction.
Alesia Chernikova
Alina Oprea
Cristina Nita-Rotaru
BaekGyu Kim
2018
conf/ccs
The House That Knows You: User Authentication Based on IoT Data.
Talha Ongun
Alina Oprea
Cristina Nita-Rotaru
Mihai Christodorescu
Negin Salajegheh
2018
conf/sp
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning.
Matthew Jagielski
Alina Oprea
Battista Biggio
Chang Liu
Cristina Nita-Rotaru
Bo Li
2018
conf/acsac
MADE: Security Analytics for Enterprise Threat Detection.
Alina Oprea
Zhou Li
Robin Norris
Kevin D. Bowers
2017
conf/ccs
Robust Linear Regression Against Training Data Poisoning.
Chang Liu
Bo Li
Yevgeniy Vorobeychik
Alina Oprea
2016
conf/acsac
Catching predators at watering holes: finding and understanding strategically compromised websites.
Sumayah A. Alrwais
Kan Yuan
Eihal Alowaisheq
Xiaojing Liao
Alina Oprea
XiaoFeng Wang
Zhou Li
2015
conf/dsn
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data.
Alina Oprea
Zhou Li
Ting-Fang Yen
Sang H. Chin
Sumayah A. Alrwais
2014
conf/ccs
An Epidemiological Study of Malware Encounters in a Large Enterprise.
Ting-Fang Yen
Victor Heorhiadi
Alina Oprea
Michael K. Reiter
Ari Juels
2014
conf/ccs
CCSW 2014: Sixth ACM Cloud Computing Security Workshop.
Alina Oprea
Reihaneh Safavi-Naini
2013
journals/joc
FlipIt: The Game of "Stealthy Takeover".
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
2013
conf/acsac
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Ting-Fang Yen
Alina Oprea
Kaan Onarlioglu
Todd Leetham
William K. Robertson
Ari Juels
Engin Kirda
2012
conf/ccs
Hourglass schemes: how to prove that cloud files are encrypted.
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
Emil Stefanov
Nikos Triandopoulos
2012
conf/dsn
Practical scrubbing: Getting to the bad sector at the right time.
George Amvrosiadis
Alina Oprea
Bianca Schroeder
2012
conf/acsac
Iris: a scalable cloud file system with efficient integrity checks.
Emil Stefanov
Marten van Dijk
Ari Juels
Alina Oprea
2011
conf/ccs
How to tell if your cloud files are vulnerable to drive crashes.
Kevin D. Bowers
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
2011
conf/sp
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Yinqian Zhang
Ari Juels
Alina Oprea
Michael K. Reiter
2009
conf/ccs
HAIL: a high-availability and integrity layer for cloud storage.
Kevin D. Bowers
Ari Juels
Alina Oprea
2009
conf/ccs
Proofs of retrievability: theory and implementation.
Kevin D. Bowers
Ari Juels
Alina Oprea
2009
conf/esorics
Authentic Time-Stamps for Archival Storage.
Alina Oprea
Kevin D. Bowers
2007
conf/uss
Integrity Checking in Cryptographic File Systems with Constant Trusted Storage.
Alina Oprea
Michael K. Reiter
2006
conf/esorics
Secure Key-Updating for Lazy Revocation.
Michael Backes
Christian Cachin
Alina Oprea
2005
conf/ndss
Space-Efficient Block Storage Integrity.
Alina Oprea
Michael K. Reiter
2004
conf/acns
Private Keyword-Based Push and Pull with Applications to Anonymous Communication.
Lea Kissner
Alina Oprea
Michael K. Reiter
Dawn Xiaodong Song
Ke Yang
2004
conf/acsac
Securing a Remote Terminal Application with a Mobile Trusted Device.
Alina Oprea
Dirk Balfanz
Glenn Durfee
Diana K. Smetters
2003
conf/ccs
Automatic generation of two-party computations.
Philip D. MacKenzie
Alina Oprea
Michael K. Reiter
Coauthors
Adam Roberts
(1)
Afsah Anwar
(1)
Alastair Nottingham
(1)
Alesia Chernikova
(2)
Alina Oprea
(42)
Ambra Demontis
(1)
Andrew Yuan
(1)
Ari Juels
(9)
Ariel Herbert-Voss
(1)
BaekGyu Kim
(1)
Battista Biggio
(2)
Benjamin A. Miller
(1)
Benjamin Zi Hao Zhao
(1)
Bianca Schroeder
(1)
Bo Li
(2)
Chang Liu
(2)
Cheng Tan
(1)
Christian Cachin
(1)
Colin Raffel
(1)
Cristina Nita-Rotaru
(5)
Dawn Song
(1)
Dawn Xiaodong Song
(1)
Diana K. Smetters
(1)
Dimitrios Papadopoulos
(1)
Dirk Balfanz
(1)
Eihal Alowaisheq
(1)
Emil Stefanov
(2)
Engin Kirda
(2)
Eric Wallace
(1)
Fabio Roli
(1)
Florian Tramèr
(2)
George Amvrosiadis
(1)
Giorgio Severi
(4)
Glenn Durfee
(1)
Gökberk Yar
(1)
Haifeng Qian
(1)
Harsh Chaudhari
(1)
Indranil Jana
(1)
Jack W. Davidson
(2)
Jason Hiser
(2)
Jason Matterer
(1)
Jialin Wen
(1)
Jim Meyer
(1)
John Abascal
(2)
John Loughner
(1)
John T. Holodnak
(1)
Jonathan R. Ullman
(3)
Kaan Onarlioglu
(1)
Kan Yuan
(1)
Katherine Lee
(1)
Ke Yang
(1)
Kendra Kratkiewicz
(1)
Kevin D. Bowers
(5)
Lea Kissner
(1)
Malathi Veeraraghavan
(1)
Marco Melis
(1)
Marten van Dijk
(4)
Matthew Jagielski
(7)
Matthew Wilden
(1)
Maura Pintor
(1)
Michael Backes
(1)
Michael K. Reiter
(6)
Mihai Christodorescu
(1)
Minhui Xue
(1)
Negin Salajegheh
(1)
Nicholas Carlini
(1)
Nicola Perra
(1)
Nicolò Gozzi
(1)
Niklas Pousette Harger
(1)
Nikos Triandopoulos
(2)
Oliver Spohngellert
(1)
Philip D. MacKenzie
(1)
Priyanka Angadi
(1)
Reihaneh Safavi-Naini
(1)
Robin Norris
(1)
Ronald L. Rivest
(3)
Roxana Geambasu
(1)
Roy Hodgman
(1)
Sang H. Chin
(1)
Scott E. Coull
(1)
Simona Boboila
(4)
Stanley Wu
(2)
Sumayah A. Alrwais
(2)
Talha Ongun
(3)
Tina Eliassi-Rad
(3)
Ting-Fang Yen
(3)
Todd Leetham
(1)
Tom B. Brown
(1)
Tom Sellers
(1)
Úlfar Erlingsson
(1)
Victor Heorhiadi
(1)
William K. Robertson
(1)
Xianrui Meng
(1)
XiaoFeng Wang
(1)
Xiaojing Liao
(1)
Yevgeniy Vorobeychik
(1)
Yi Hui Chen
(1)
Yinqian Zhang
(1)
Yuxuan Wang
(1)
Zhou Li
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to