What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Prateek Mittal
Google Scholar
75
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem.
Mona Wang
Pellaeon Lin
Jeffrey Knockel
Will Greenberg
Jonathan Mayer
Prateek Mittal
2025
conf/sp
WireWatch: Measuring the Security of Proprietary Network Encryption in the Global Android Ecosystem.
Mona Wang
Jeffrey Knockel
Zoë Reichert
Prateek Mittal
Jonathan R. Mayer
2024
conf/uss
PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses.
Chong Xiang
Tong Wu
Sihui Dai
Jonathan Petit
Suman Jana
Prateek Mittal
2023
journals/popets
RAVEN: Stateless Rapid IP Address Variation for Enterprise Networks.
Liang Wang
Hyojoon Kim
Prateek Mittal
Jennifer Rexford
2023
conf/uss
How Effective is Multiple-Vantage-Point Domain Control Validation?
Grace H. Cimaszewski
Henry Birge-Lee
Liang Wang
Jennifer Rexford
Prateek Mittal
2023
conf/uss
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples.
Xiangyu Qi
Tinghao Xie
Jiachen T. Wang
Tong Wu
Saeed Mahloujifar
Prateek Mittal
2023
conf/sp
ObjectSeeker: Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.
Chong Xiang
Alexander Valtchanov
Saeed Mahloujifar
Prateek Mittal
2022
journals/popets
Leveraging strategic connection migration-powered traffic splitting for privacy.
Mona Wang
Anunay Kulshrestha
Liang Wang
Prateek Mittal
2022
journals/popets
Athena: Probabilistic Verification of Machine Unlearning.
David Marco Sommer
Liwei Song
Sameer Wagh
Prateek Mittal
2022
journals/popets
Machine Learning with Differentially Private Labels: Mechanisms and Frameworks.
Xinyu Tang
Milad Nasr
Saeed Mahloujifar
Virat Shejwalkar
Liwei Song
Amir Houmansadr
Prateek Mittal
2022
conf/ccs
Poster: Investigating QUIC's Potential Impact on Censorship Circumvention.
Anna Harbluk Lorimer
Nick Feamster
Prateek Mittal
2022
conf/ccs
Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation.
Tong Wu
Tianhao Wang
Vikash Sehwag
Saeed Mahloujifar
Prateek Mittal
2022
conf/uss
QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework.
Jean-Pierre Smith
Luca Dolfi
Prateek Mittal
Adrian Perrig
2022
conf/uss
Creating a Secure Underlay for the Internet.
Henry Birge-Lee
Joel Wanner
Grace H. Cimaszewski
Jonghoon Kwon
Liang Wang
François Wirz
Prateek Mittal
Adrian Perrig
Yixin Sun
2022
conf/uss
PatchCleanser: Certifiably Robust Defense against Adversarial Patches for Any Image Classifier.
Chong Xiang
Saeed Mahloujifar
Prateek Mittal
2022
conf/uss
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture.
Xinyu Tang
Saeed Mahloujifar
Liwei Song
Virat Shejwalkar
Milad Nasr
Amir Houmansadr
Prateek Mittal
2022
conf/sp
Parameterizing Activation Functions for Adversarial Robustness.
Sihui Dai
Saeed Mahloujifar
Prateek Mittal
2022
conf/ndss
F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure.
Laurent Chuat
Cyrill Krähenbühl
Prateek Mittal
Adrian Perrig
2022
conf/acsac
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
Yushan Liu
Xiaokui Shu
Yixin Sun
Jiyong Jang
Prateek Mittal
2021
journals/popets
Website Fingerprinting in the Age of QUIC.
Jean-Pierre Smith
Prateek Mittal
Adrian Perrig
2021
journals/popets
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning.
Sameer Wagh
Shruti Tople
Fabrice Benhamouda
Eyal Kushilevitz
Prateek Mittal
Tal Rabin
2021
conf/ccs
DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks.
Chong Xiang
Prateek Mittal
2021
conf/ccs
New Directions in Automated Traffic Analysis.
Jordan Holland
Paul Schmitt
Nick Feamster
Prateek Mittal
2021
conf/uss
Systematic Evaluation of Privacy Risks of Machine Learning Models.
Liwei Song
Prateek Mittal
2021
conf/uss
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.
Henry Birge-Lee
Liang Wang
Daniel McCarney
Roland Shoemaker
Jennifer Rexford
Prateek Mittal
2021
conf/uss
PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking.
Chong Xiang
Arjun Nitin Bhagoji
Vikash Sehwag
Prateek Mittal
2020
conf/ccs
CLAPS: Client-Location-Aware Path Selection in Tor.
Florentin Rochet
Ryan Wails
Aaron Johnson
Prateek Mittal
Olivier Pereira
2020
conf/eurosp
Detecting Malware Injection with Program-DNS Behavior.
Yixin Sun
Kangkook Jee
Suphannee Sivakorn
Zhichun Li
Cristian Lumezanu
Lauri Korts-Pärn
Zhenyu Wu
Junghwan Rhee
Chung Hwan Kim
Mung Chiang
Prateek Mittal
2019
journals/popets
Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing.
Changchang Liu
Xi He
Thee Chanyaswad
Shiqiang Wang
Prateek Mittal
2019
journals/popets
DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor.
Hans Hanley
Yixin Sun
Sameer Wagh
Prateek Mittal
2019
journals/popets
Guard Placement Attacks on Path Selection Algorithms for Tor.
Gerry Wan
Aaron Johnson
Ryan Wails
Sameer Wagh
Prateek Mittal
2019
journals/popets
RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release.
Thee Chanyaswad
Changchang Liu
Prateek Mittal
2019
conf/ccs
Privacy Risks of Securing Machine Learning Models against Adversarial Examples.
Liwei Song
Reza Shokri
Prateek Mittal
2019
conf/ccs
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Hooman Mohajeri Moghaddam
Gunes Acar
Ben Burgess
Arunesh Mathur
Danny Yuxing Huang
Nick Feamster
Edward W. Felten
Prateek Mittal
Arvind Narayanan
2019
conf/ccs
Analyzing the Robustness of Open-World Machine Learning.
Vikash Sehwag
Arjun Nitin Bhagoji
Liwei Song
Chawin Sitawarin
Daniel Cullina
Mung Chiang
Prateek Mittal
2019
conf/ccs
SICO: Surgical Interception Attacks by Manipulating BGP Communities.
Henry Birge-Lee
Liang Wang
Jennifer Rexford
Prateek Mittal
2019
conf/uss
Robust Website Fingerprinting Through the Cache Occupancy Channel.
Anatoly Shusterman
Lachlan Kang
Yarden Haskal
Yosef Meltser
Prateek Mittal
Yossi Oren
Yuval Yarom
2019
conf/sp
Membership Inference Attacks Against Adversarially Robust Deep Learning Models.
Liwei Song
Reza Shokri
Prateek Mittal
2018
journals/popets
Cracking ShadowCrypt: Exploring the Limitations of Secure I/O Systems in Internet Browsers.
Michael Freyberger
Warren He
Devdatta Akhawe
Michelle L. Mazurek
Prateek Mittal
2018
journals/popets
Differentially Private Oblivious RAM.
Sameer Wagh
Paul Cuff
Prateek Mittal
2018
journals/popets
Tempest: Temporal Dynamics in Anonymity Systems.
Ryan Wails
Yixin Sun
Aaron Johnson
Mung Chiang
Prateek Mittal
2018
conf/ccs
Acoustic Denial of Service Attacks on Hard Disk Drives.
Mohammad Shahrad
Arsalan Mosenia
Liwei Song
Mung Chiang
David Wentzlaff
Prateek Mittal
2018
conf/ccs
MVG Mechanism: Differential Privacy under Matrix-Valued Query.
Thee Chanyaswad
Alex Dytso
H. Vincent Poor
Prateek Mittal
2018
conf/ccs
Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints.
Vikash Sehwag
Chawin Sitawarin
Arjun Nitin Bhagoji
Arsalan Mosenia
Mung Chiang
Prateek Mittal
2018
conf/uss
Bamboozling Certificate Authorities with BGP.
Henry Birge-Lee
Yixin Sun
Anne Edmundson
Jennifer Rexford
Prateek Mittal
2018
conf/uss
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Peng Gao
Xusheng Xiao
Ding Li
Zhichun Li
Kangkook Jee
Zhenyu Wu
Chung Hwan Kim
Sanjeev R. Kulkarni
Prateek Mittal
2018
conf/uss
BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.
Saleh Soltan
Prateek Mittal
H. Vincent Poor
2018
conf/uss
Automatically Generating a Large, Culture-Specific Blocklist for China.
Austin Hounsel
Prateek Mittal
Nick Feamster
2018
conf/cns
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Peng Gao
Binghui Wang
Neil Zhenqiang Gong
Sanjeev R. Kulkarni
Kurt Thomas
Prateek Mittal
2018
conf/ndss
Towards a Timely Causality Analysis for Enterprise Security.
Yushan Liu
Mu Zhang
Ding Li
Kangkook Jee
Zhichun Li
Zhenyu Wu
Junghwan Rhee
Prateek Mittal
2017
conf/ccs
POSTER: Inaudible Voice Commands.
Liwei Song
Prateek Mittal
2017
conf/sp
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks.
Yixin Sun
Anne Edmundson
Nick Feamster
Mung Chiang
Prateek Mittal
2016
journals/tifs
Seed-Based De-Anonymizability Quantification of Social Networks.
Shouling Ji
Weiqing Li
Neil Zhenqiang Gong
Prateek Mittal
Raheem A. Beyah
2016
conf/ccs
SmartWalk: Enhancing Social Network Security via Adaptive Random Walks.
Yushan Liu
Shouling Ji
Prateek Mittal
2016
conf/ndss
LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships.
Changchang Liu
Prateek Mittal
2016
conf/ndss
Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples.
Changchang Liu
Supriyo Chakraborty
Prateek Mittal
2015
conf/ccs
Exploiting Temporal Dynamics in Sybil Defenses.
Changchang Liu
Peng Gao
Matthew K. Wright
Prateek Mittal
2015
conf/uss
RAPTOR: Routing Attacks on Privacy in Tor.
Yixin Sun
Anne Edmundson
Laurent Vanbever
Oscar Li
Jennifer Rexford
Mung Chiang
Prateek Mittal
2015
conf/uss
SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Shouling Ji
Weiqing Li
Prateek Mittal
Xin Hu
Raheem A. Beyah
2015
conf/ndss
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Shouling Ji
Weiqing Li
Neil Zhenqiang Gong
Prateek Mittal
Raheem A. Beyah
2014
journals/tifs
SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection.
Neil Zhenqiang Gong
Mario Frank
Prateek Mittal
2014
conf/ccs
Re<sup>3</sup>: relay reliability reputation for anonymity systems.
Anupam Das
Nikita Borisov
Prateek Mittal
Matthew Caesar
2013
conf/ndss
Pisces: Anonymous Communication Using Social Networks.
Prateek Mittal
Matthew K. Wright
Nikita Borisov
2013
conf/ndss
Preserving Link Privacy in Social Network Based Systems.
Prateek Mittal
Charalampos Papamanthou
Dawn Xiaodong Song
2012
conf/ndss
X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks.
Prateek Mittal
Matthew Caesar
Nikita Borisov
2011
conf/ccs
EASiER: encryption-based access control in social networks with efficient revocation.
Sonia Jahid
Prateek Mittal
Nikita Borisov
2011
conf/ccs
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Prateek Mittal
Ahmed Khurshid
Joshua Juen
Matthew Caesar
Nikita Borisov
2011
conf/uss
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval.
Prateek Mittal
Femi G. Olumofin
Carmela Troncoso
Nikita Borisov
Ian Goldberg
2010
conf/ccs
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
Qiyan Wang
Prateek Mittal
Nikita Borisov
2010
conf/uss
BotGrep: Finding P2P Bots with Structured Graph Analysis.
Shishir Nagaraja
Prateek Mittal
Chi-Yao Hong
Matthew Caesar
Nikita Borisov
2010
conf/uss
Scalable Anonymous Communication with Provable Security.
Prateek Mittal
Nikita Borisov
Carmela Troncoso
Alfredo Rial
2009
conf/ccs
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies.
Prateek Mittal
Nikita Borisov
2009
conf/ndss
SybilInfer: Detecting Sybil Nodes using Social Networks.
George Danezis
Prateek Mittal
2008
conf/ccs
Information leaks in structured peer-to-peer anonymous communication systems.
Prateek Mittal
Nikita Borisov
2007
conf/ccs
Denial of service or denial of security?
Nikita Borisov
George Danezis
Prateek Mittal
Parisa Tabriz
Coauthors
Aaron Johnson
(3)
Adrian Perrig
(4)
Ahmed Khurshid
(1)
Alex Dytso
(1)
Alexander Valtchanov
(1)
Alfredo Rial
(1)
Amir Houmansadr
(2)
Anatoly Shusterman
(1)
Anna Harbluk Lorimer
(1)
Anne Edmundson
(3)
Anunay Kulshrestha
(1)
Anupam Das
(1)
Arjun Nitin Bhagoji
(3)
Arsalan Mosenia
(2)
Arunesh Mathur
(1)
Arvind Narayanan
(1)
Austin Hounsel
(1)
Ben Burgess
(1)
Binghui Wang
(1)
Carmela Troncoso
(2)
Changchang Liu
(5)
Charalampos Papamanthou
(1)
Chawin Sitawarin
(2)
Chi-Yao Hong
(1)
Chong Xiang
(5)
Chung Hwan Kim
(2)
Cristian Lumezanu
(1)
Cyrill Krähenbühl
(1)
Daniel Cullina
(1)
Daniel McCarney
(1)
Danny Yuxing Huang
(1)
David Marco Sommer
(1)
David Wentzlaff
(1)
Dawn Xiaodong Song
(1)
Devdatta Akhawe
(1)
Ding Li
(2)
Edward W. Felten
(1)
Eyal Kushilevitz
(1)
Fabrice Benhamouda
(1)
Femi G. Olumofin
(1)
Florentin Rochet
(1)
François Wirz
(1)
George Danezis
(2)
Gerry Wan
(1)
Grace H. Cimaszewski
(2)
Gunes Acar
(1)
H. Vincent Poor
(2)
Hans Hanley
(1)
Henry Birge-Lee
(5)
Hooman Mohajeri Moghaddam
(1)
Hyojoon Kim
(1)
Ian Goldberg
(1)
Jean-Pierre Smith
(2)
Jeffrey Knockel
(2)
Jennifer Rexford
(6)
Jiachen T. Wang
(1)
Jiyong Jang
(1)
Joel Wanner
(1)
Jonathan Mayer
(1)
Jonathan Petit
(1)
Jonathan R. Mayer
(1)
Jonghoon Kwon
(1)
Jordan Holland
(1)
Joshua Juen
(1)
Junghwan Rhee
(2)
Kangkook Jee
(3)
Kurt Thomas
(1)
Lachlan Kang
(1)
Laurent Chuat
(1)
Laurent Vanbever
(1)
Lauri Korts-Pärn
(1)
Liang Wang
(6)
Liwei Song
(9)
Luca Dolfi
(1)
Mario Frank
(1)
Matthew Caesar
(4)
Matthew K. Wright
(2)
Michael Freyberger
(1)
Michelle L. Mazurek
(1)
Milad Nasr
(2)
Mohammad Shahrad
(1)
Mona Wang
(3)
Mu Zhang
(1)
Mung Chiang
(7)
Neil Zhenqiang Gong
(4)
Nick Feamster
(5)
Nikita Borisov
(12)
Olivier Pereira
(1)
Oscar Li
(1)
Parisa Tabriz
(1)
Paul Cuff
(1)
Paul Schmitt
(1)
Pellaeon Lin
(1)
Peng Gao
(3)
Prateek Mittal
(75)
Qiyan Wang
(1)
Raheem A. Beyah
(3)
Reza Shokri
(2)
Roland Shoemaker
(1)
Ryan Wails
(3)
Saeed Mahloujifar
(7)
Saleh Soltan
(1)
Sameer Wagh
(5)
Sanjeev R. Kulkarni
(2)
Shiqiang Wang
(1)
Shishir Nagaraja
(1)
Shouling Ji
(4)
Shruti Tople
(1)
Sihui Dai
(2)
Sonia Jahid
(1)
Suman Jana
(1)
Suphannee Sivakorn
(1)
Supriyo Chakraborty
(1)
Tal Rabin
(1)
Thee Chanyaswad
(3)
Tianhao Wang
(1)
Tinghao Xie
(1)
Tong Wu
(3)
Vikash Sehwag
(4)
Virat Shejwalkar
(2)
Warren He
(1)
Weiqing Li
(3)
Will Greenberg
(1)
Xi He
(1)
Xiangyu Qi
(1)
Xiaokui Shu
(1)
Xin Hu
(1)
Xinyu Tang
(2)
Xusheng Xiao
(1)
Yarden Haskal
(1)
Yixin Sun
(8)
Yosef Meltser
(1)
Yossi Oren
(1)
Yushan Liu
(3)
Yuval Yarom
(1)
Zhenyu Wu
(3)
Zhichun Li
(3)
Zoë Reichert
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to