Lujo Bauer
Carnegie Mellon University
H-index: 57
North America-United States
Top articles of Lujo Bauer
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
RS-Del: Edit distance robustness certificates for sequence classifiers via randomized deletion | Advances in Neural Information Processing Systems | Zhuoqun Huang Neil G Marchant Keane Lucas Lujo Bauer Olga Ohrimenko | 2024/2/13 |
Shedding light on inconsistencies in grid cybersecurity: Disconnects and recommendations | Brian Singer Amritanshu Pandey Shimiao Li Lujo Bauer Craig Miller | 2023/5/21 | |
Adversarial training for {Raw-Binary} malware classifiers | Keane Lucas Samruddhi Pai Weiran Lin Lujo Bauer Michael K Reiter | 2023 | |
Widespread Third-Party Tracking On Hospital Websites Poses Privacy Risks For Patients And Legal Liability For Hospitals: Study examines the widespread use of third-party … | Health Affairs | Ari B Friedman Raina M Merchant Amey Maley Karim Farhat Kristen Smith | 2023/4/1 |
Subspace Grid-sweep: ML Defense Evaluation via Constrained Brute-force Search | Keane Lucas Matthew Jagielski Florian Tramèr Lujo Bauer Nicholas Carlini | 2023/10/13 | |
Randomness in ml defenses helps persistent attackers and hinders evaluators | arXiv preprint arXiv:2302.13464 | Keane Lucas Matthew Jagielski Florian Tramèr Lujo Bauer Nicholas Carlini | 2023/2/27 |
The impact of exposed passwords on honeyword efficacy | arXiv preprint arXiv:2309.10323 | Zonghao Huang Lujo Bauer Michael K Reiter | 2023/9/19 |
Speculative privacy concerns about AR glasses data collection | Proceedings on Privacy Enhancing Technologies | Andrea Gallardo Chris Choy Jaideep Juneja Efe Bozkir Camille Cobb | 2023 |
Group-based Robustness: A General Framework for Customized Robustness in the Real World | arXiv preprint arXiv:2306.16614 | Weiran Lin Keane Lucas Neo Eyal Lujo Bauer Michael K Reiter | 2023/6/29 |
Towards Usable Security Analysis Tools for {Trigger-Action} Programming | McKenna McCall Eric Zeng Faysal Hossain Shezan Mitchell Yang Lujo Bauer | 2023 | |
Investigating Advertisers’ Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists | Su-Chin Lin Kai-Hsiang Chou Yen Chen Hsu-Chun Hsiao Darion Cassel | 2022/4/25 | |
" Adulthood is trying each of the same six passwords that you use for everything": The Scarcity and Ambiguity of Security Advice on Social Media | Proceedings of the ACM on Human-Computer Interaction | Sruti Bhagavatula Lujo Bauer Apu Kapadia | 2022/11/11 |
Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles | Andrea Gallardo Hanseul Kim Tianying Li Lujo Bauer Lorrie Cranor | 2022 | |
Prevalence of third-party tracking on abortion clinic web pages | JAMA Internal Medicine | Ari B Friedman Lujo Bauer Rachel Gonzales Matthew S McCoy | 2022/11/1 |
OmniCrawl: Comprehensive measurement of web tracking with real desktop and mobile browsers | Proceedings on Privacy Enhancing Technologies | Darion Cassel Su-Chin Lin Alessio Buraggina William Wang Andrew Zhang | 2022 |
Deceiving ML-Based Friend-or-Foe Identification for Executables | Keane Lucas Mahmood Sharif Lujo Bauer Michael K Reiter Saurabh Shintre | 2022/10/7 | |
Perspectives from a comprehensive evaluation of reconstruction-based anomaly detection in industrial control systems | Clement Fung Shreya Srinarasi Keane Lucas Hay Bryan Phee Lujo Bauer | 2022/9/24 | |
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention | Pervasive and Mobile Computing | Tianshi Li Camille Cobb Jackie Junrui Yang Sagar Baviskar Yuvraj Agarwal | 2021/8/1 |
Malware makeover: Breaking ml-based static analysis by modifying executable bytes | Keane Lucas Mahmood Sharif Lujo Bauer Michael K Reiter Saurabh Shintre | 2021/5/24 | |
Towards a lightweight, hybrid approach for detecting DOM XSS vulnerabilities with machine learning | William Melicher Clement Fung Lujo Bauer Limin Jia | 2021/4/19 |