Tudor Dumitras
University of Maryland
H-index: 34
North America-United States
Top articles of Tudor Dumitras
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness | Shoumik Saha Wenxiao Wang Yigitcan Kaya Soheil Feizi Tudor Dumitras | 2023/10/13 | |
Like Oil and Water: Group Robustness Methods and Poisoning Defenses Don't Mix | Michael-Andrei Panaitescu-Liess Yigitcan Kaya Sicheng Zhu Furong Huang Tudor Dumitras | 2024/1 | |
Systems and methods for predicting development of functional vulnerability exploits | 2023/8/17 | ||
Like Oil and Water: Group Robustness and Poisoning Defenses Don’t Mix | Michael-Andrei Panaitescu-Liess Yigitcan Kaya Tudor Dumitras | 2023/8/7 | |
When Malware Changed Its Mind: How" Split Personalities" Affect Malware Analysis and Detection | Tudor Dumitras | 2023 | |
Expected exploitability: Predicting the development of functional vulnerability exploits | Octavian Suciu Connor Nelson Zhuoer Lyu Tiffany Bao Tudor Dumitraș | 2022 | |
Qu-anti-zation: Exploiting quantization artifacts for achieving adversarial outcomes | Advances in Neural Information Processing Systems | Sanghyun Hong Michael-Andrei Panaitescu-Liess Yigitcan Kaya Tudor Dumitras | 2021/12/6 |
When does data augmentation help with membership inference attacks? | Yigitcan Kaya Tudor Dumitras | 2021/7/1 | |
Security analysis on practices of certificate authorities in the HTTPS phishing ecosystem | Doowon Kim Haehyun Cho Yonghwi Kwon Adam Doupé Sooel Son | 2021/5/24 | |
When malware changed its mind: An empirical study of variable program behaviors in the real world | Erin Avllazagaj Ziyun Zhu Leyla Bilge Davide Balzarotti Tudor Dumitraș | 2021 | |
A panda? no, it's a sloth: Slowdown attacks on adaptive multi-exit neural network inference | arXiv preprint arXiv:2010.02432 | Sanghyun Hong Yiğitcan Kaya Ionuţ-Vlad Modoranu Tudor Dumitraş | 2020/10/6 |
On the effectiveness of regularization against membership inference attacks | arXiv preprint arXiv:2006.05336 | Yigitcan Kaya Sanghyun Hong Tudor Dumitras | 2020/6/9 |
On the effectiveness of mitigating data poisoning attacks with gradient shaping | arXiv preprint arXiv:2002.11497 | Sanghyun Hong Varun Chandrasekaran Yiğitcan Kaya Tudor Dumitraş Nicolas Papernot | 2020/2/26 |
How to 0wn nas in your spare time | arXiv preprint arXiv:2002.06776 | Sanghyun Hong Michael Davinroy Yiğitcan Kaya Dana Dachman-Soled Tudor Dumitraş | 2020/2/17 |