What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Reza Shokri
Google Scholar
ORCID:
0000-0001-9816-0173
22
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
Efficient Privacy Auditing in Federated Learning.
Hongyan Chang
Brandon Edwards
Anindya S. Paul
Reza Shokri
2022
conf/ccs
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets.
Florian Tramèr
Reza Shokri
Ayrton San Joaquin
Hoang Le
Matthew Jagielski
Sanghyun Hong
Nicholas Carlini
2022
conf/ccs
Enhanced Membership Inference Attacks against Machine Learning Models.
Jiayuan Ye
Aadyaa Maddi
Sasi Kumar Murakonda
Vincent Bindschaedler
Reza Shokri
2021
conf/eurosp
On the Privacy Risks of Algorithmic Fairness.
Hongyan Chang
Reza Shokri
2020
conf/ccs
Membership Encoding for Deep Learning.
Congzheng Song
Reza Shokri
2020
conf/eurosp
Bypassing Backdoor Detection Algorithms in Deep Learning.
Te Juin Lester Tan
Reza Shokri
2019
conf/ccs
Privacy Risks of Securing Machine Learning Models against Adversarial Examples.
Liwei Song
Reza Shokri
Prateek Mittal
2019
conf/sp
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning.
Milad Nasr
Reza Shokri
Amir Houmansadr
2019
conf/sp
Membership Inference Attacks Against Adversarially Robust Deep Learning Models.
Liwei Song
Reza Shokri
Prateek Mittal
2019
conf/ih
Trusting Machine Learning: Privacy, Robustness, and Transparency Challenges.
Reza Shokri
2018
conf/ccs
Machine Learning with Membership Privacy using Adversarial Regularization.
Milad Nasr
Reza Shokri
Amir Houmansadr
2017
conf/sp
Membership Inference Attacks Against Machine Learning Models.
Reza Shokri
Marco Stronati
Congzheng Song
Vitaly Shmatikov
2016
conf/sp
Synthesizing Plausible Privacy-Preserving Location Traces.
Vincent Bindschaedler
Reza Shokri
2015
journals/popets
Privacy Games: Optimal User-Centric Data Obfuscation.
Reza Shokri
2015
conf/ccs
Privacy-Preserving Deep Learning.
Reza Shokri
Vitaly Shmatikov
2015
conf/ndss
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.
Igor Bilogrevic
Kévin Huguenin
Stefan Mihaila
Reza Shokri
Jean-Pierre Hubaux
2014
conf/ccs
Quantifying Web-Search Privacy.
Arthur Gervais
Reza Shokri
Adish Singla
Srdjan Capkun
Vincent Lenders
2012
conf/ccs
Protecting location privacy: optimal strategy against localization attacks.
Reza Shokri
George Theodorakopoulos
Carmela Troncoso
Jean-Pierre Hubaux
Jean-Yves Le Boudec
2011
conf/fc
Evaluating the Privacy Risk of Location-Based Services.
Julien Freudiger
Reza Shokri
Jean-Pierre Hubaux
2011
conf/sp
Quantifying Location Privacy.
Reza Shokri
George Theodorakopoulos
Jean-Yves Le Boudec
Jean-Pierre Hubaux
2010
conf/wisec
On the tradeoff between trust and privacy in wireless ad hoc networks.
Maxim Raya
Reza Shokri
Jean-Pierre Hubaux
2009
conf/wisec
A practical secure neighbor verification protocol for wireless sensor networks.
Reza Shokri
Marcin Poturalski
Gael Ravot
Panos Papadimitratos
Jean-Pierre Hubaux
Coauthors
Aadyaa Maddi
(1)
Adish Singla
(1)
Amir Houmansadr
(2)
Anindya S. Paul
(1)
Arthur Gervais
(1)
Ayrton San Joaquin
(1)
Brandon Edwards
(1)
Carmela Troncoso
(1)
Congzheng Song
(2)
Florian Tramèr
(1)
Gael Ravot
(1)
George Theodorakopoulos
(2)
Hoang Le
(1)
Hongyan Chang
(2)
Igor Bilogrevic
(1)
Jean-Pierre Hubaux
(6)
Jean-Yves Le Boudec
(2)
Jiayuan Ye
(1)
Julien Freudiger
(1)
Kévin Huguenin
(1)
Liwei Song
(2)
Marcin Poturalski
(1)
Marco Stronati
(1)
Matthew Jagielski
(1)
Maxim Raya
(1)
Milad Nasr
(2)
Nicholas Carlini
(1)
Panos Papadimitratos
(1)
Prateek Mittal
(2)
Reza Shokri
(22)
Sanghyun Hong
(1)
Sasi Kumar Murakonda
(1)
Srdjan Capkun
(1)
Stefan Mihaila
(1)
Te Juin Lester Tan
(1)
Vincent Bindschaedler
(2)
Vincent Lenders
(1)
Vitaly Shmatikov
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to