Michael Reiter
Duke University
H-index: 91
North America-United States
Top articles of Michael Reiter
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Mudjacking: Patching backdoor vulnerabilities in foundation models | Hongbin Liu Michael K Reiter Neil Zhenqiang Gong | 2024 | |
The unique chain rule and its applications | Financial Cryptography and Data Security | Adithya Bhat Akhil Bandarupalli Saurabh Bagchi Aniket Kate Michael K Reiter | 2023 |
Group-based robustness: A general framework for customized robustness in the real world | arXiv preprint arXiv:2306.16614 | Weiran Lin Keane Lucas Neo Eyal Lujo Bauer Michael K Reiter | 2023/6/29 |
Prioritizing remediation of enterprise hosts by malware execution risk | Andrew Chi Blake Anderson Michael K Reiter | 2023/12/4 | |
Communication-efficient BFT using small trusted hardware to tolerate minority corruption | Sravya Yandamuri Ittai Abraham Kartik Nayak Michael K Reiter | 2023 | |
Mendata: A framework to purify manipulated training data | arXiv preprint arXiv:2312.01281 | Zonghao Huang Neil Gong Michael K Reiter | 2023/12/3 |
Nimble: Fast and safe migration of network functions | Sheng Liu Michael K Reiter Theophilus A Benson | 2023/5/17 | |
Distance-aware private set intersection | Anrin Chakraborti Giulia Fanti Michael K Reiter | 2023 | |
EESMR: Energy efficient BFT---SMR for the masses | Adithya Bhat Akhil Bandarupalli Manish Nagaraj Saurabh Bagchi Aniket Kate | 2023/11/27 | |
Looking backwards (and forwards): NSF Secure and Trustworthy Computing 20-year retrospective panel transcription | IEEE Security & Privacy | Carl Landwehr Michael K Reiter Laurie Williams Gene Tsudik Trent Jaeger | 2023/1/24 |
HashRand: Efficient asynchronous random beacon without threshold cryptographic setup | Cryptology ePrint Archive | Akhil Bandarupalli Adithya Bhat Saurabh Bagchi Aniket Kate Michael Reiter | 2023 |
The impact of exposed passwords on honeyword efficacy | arXiv preprint arXiv:2309.10323 | Zonghao Huang Lujo Bauer Michael K Reiter | 2023/9/19 |
Adversarial training for raw-binary malware classifiers | Keane Lucas Samruddhi Pai Weiran Lin Lujo Bauer Michael K Reiter | 2023 | |
Privately evaluating region overlaps with applications to collaborative sensor output validation | Anrin Chakraborti Michael K Reiter | 2023/7/10 | |
Deceiving ML-based friend-or-foe identification for executables | Keane Lucas Mahmood Sharif Lujo Bauer Michael K Reiter Saurabh Shintre | 2022/10/7 | |
Defeating traffic analysis via differential privacy: a case study on streaming traffic | International Journal of Information Security | Xiaokuan Zhang Jihun Hamm Michael K Reiter Yinqian Zhang | 2022/6 |
Practical integration via separable bijective networks | Christopher M Bender Patrick Emmanuel Michael K Reiter Junier Oliva | 2021/10/6 | |
Bernoulli honeywords | arXiv preprint arXiv:2212.12759 | Ke Coby Wang Michael K Reiter | 2022/12/24 |
ENGRAFT: Enclave-guarded Raft on Byzantine faulty nodes | Weili Wang Sen Deng Jianyu Niu Michael K Reiter Yinqian Zhang | 2022/11/7 | |
Using Amnesia to detect credential database breaches | Ke Coby Wang Michael K Reiter | 2021 |