What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nicholas Carlini
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
SoK: Watermarking for AI-Generated Content.
Xuandong Zhao
Sam Gunn
Miranda Christ
Jaiden Fairoze
Andres Fabrega
Nicholas Carlini
Sanjam Garg
Sanghyun Hong
Milad Nasr
Florian Tramèr
Somesh Jha
Lei Li
Yu-Xiang Wang
Dawn Song
2025
conf/eurocrypt
Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting.
Nicholas Carlini
Jorge Chávez-Saab
Anna Hambitzer
Francisco Rodríguez-Henríquez
Adi Shamir
2024
conf/uss
Privacy Side Channels in Machine Learning Systems.
Edoardo Debenedetti
Giorgio Severi
Milad Nasr
Christopher A. Choquette-Choo
Matthew Jagielski
Eric Wallace
Nicholas Carlini
Florian Tramèr
2024
conf/sp
Poisoning Web-Scale Training Datasets is Practical.
Nicholas Carlini
Matthew Jagielski
Christopher A. Choquette-Choo
Daniel Paleka
Will Pearce
Hyrum S. Anderson
Andreas Terzis
Kurt Thomas
Florian Tramèr
2023
conf/uss
Tight Auditing of Differentially Private Machine Learning.
Milad Nasr
Jamie Hayes
Thomas Steinke
Borja Balle
Florian Tramèr
Matthew Jagielski
Nicholas Carlini
Andreas Terzis
2023
conf/uss
Extracting Training Data from Diffusion Models.
Nicholas Carlini
Jamie Hayes
Milad Nasr
Matthew Jagielski
Vikash Sehwag
Florian Tramèr
Borja Balle
Daphne Ippolito
Eric Wallace
2022
conf/ccs
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets.
Florian Tramèr
Reza Shokri
Ayrton San Joaquin
Hoang Le
Matthew Jagielski
Sanghyun Hong
Nicholas Carlini
2022
conf/sp
Membership Inference Attacks From First Principles.
Nicholas Carlini
Steve Chien
Milad Nasr
Shuang Song
Andreas Terzis
Florian Tramèr
2021
conf/ccs
Session details: Session 1: Adversarial Machine Learning.
Nicholas Carlini
2021
conf/ccs
Session details: Session 2A: Machine Learning for Cybersecurity.
Nicholas Carlini
2021
conf/uss
Extracting Training Data from Large Language Models.
Nicholas Carlini
Florian Tramèr
Eric Wallace
Matthew Jagielski
Ariel Herbert-Voss
Katherine Lee
Adam Roberts
Tom B. Brown
Dawn Song
Úlfar Erlingsson
Alina Oprea
Colin Raffel
2021
conf/uss
Poisoning the Unlabeled Dataset of Semi-Supervised Learning.
Nicholas Carlini
2021
conf/sp
Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning.
Milad Nasr
Shuang Song
Abhradeep Thakurta
Nicolas Papernot
Nicholas Carlini
2021
conf/sp
Is Private Learning Possible with Instance Encoding?
Nicholas Carlini
Samuel Deng
Sanjam Garg
Somesh Jha
Saeed Mahloujifar
Mohammad Mahmoody
Abhradeep Thakurta
Florian Tramèr
2021
conf/ih
How Private is Machine Learning?
Nicholas Carlini
2020
conf/ccs
AISec'20: 13th Workshop on Artificial Intelligence and Security.
Sadia Afroz
Nicholas Carlini
Ambra Demontis
2020
conf/uss
High Accuracy and High Fidelity Extraction of Neural Networks.
Matthew Jagielski
Nicholas Carlini
David Berthelot
Alex Kurakin
Nicolas Papernot
2020
conf/crypto
Cryptanalytic Extraction of Neural Network Models.
Nicholas Carlini
Matthew Jagielski
Ilya Mironov
2019
conf/ccs
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Sadia Afroz
Battista Biggio
Nicholas Carlini
Yuval Elovici
Asaf Shabtai
2019
conf/uss
The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks.
Nicholas Carlini
Chang Liu
Úlfar Erlingsson
Jernej Kos
Dawn Song
2018
conf/sp
Audio Adversarial Examples: Targeted Attacks on Speech-to-Text.
Nicholas Carlini
David A. Wagner
2017
conf/ccs
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods.
Nicholas Carlini
David A. Wagner
2017
conf/sp
Towards Evaluating the Robustness of Neural Networks.
Nicholas Carlini
David A. Wagner
2016
conf/uss
Hidden Voice Commands.
Nicholas Carlini
Pratyush Mishra
Tavish Vaidya
Yuankai Zhang
Micah Sherr
Clay Shields
David A. Wagner
Wenchao Zhou
2015
conf/uss
Control-Flow Bending: On the Effectiveness of Control-Flow Integrity.
Nicholas Carlini
Antonio Barresi
Mathias Payer
David A. Wagner
Thomas R. Gross
2014
conf/uss
ROP is Still Dangerous: Breaking Modern Defenses.
Nicholas Carlini
David A. Wagner
2013
conf/uss
Improved Support for Machine-assisted Ballot-level Audits.
Eric Kim
Nicholas Carlini
Andrew Chang
George Yiu
Kai Wang
David A. Wagner
2012
conf/uss
Operator-Assisted Tabulation of Optical Scan Ballots.
Kai Wang
Nicholas Carlini
Eric Kim
Ivan Motyashov
Daniel Nguyen
David A. Wagner
2012
conf/uss
An Evaluation of the Google Chrome Extension Security Architecture.
Nicholas Carlini
Adrienne Porter Felt
David A. Wagner
Coauthors
Abhradeep Thakurta
(2)
Adam Roberts
(1)
Adi Shamir
(1)
Adrienne Porter Felt
(1)
Alex Kurakin
(1)
Alina Oprea
(1)
Ambra Demontis
(1)
Andreas Terzis
(3)
Andrés Fábrega
(1)
Andrew Chang
(1)
Anna Hambitzer
(1)
Antonio Barresi
(1)
Ariel Herbert-Voss
(1)
Asaf Shabtai
(1)
Ayrton San Joaquin
(1)
Battista Biggio
(1)
Borja Balle
(2)
Chang Liu
(1)
Christopher A. Choquette-Choo
(2)
Clay Shields
(1)
Colin Raffel
(1)
Daniel Nguyen
(1)
Daniel Paleka
(1)
Daphne Ippolito
(1)
David A. Wagner
(9)
David Berthelot
(1)
Dawn Song
(3)
Edoardo Debenedetti
(1)
Eric Kim
(2)
Eric Wallace
(3)
Florian Tramèr
(9)
Francisco Rodríguez-Henríquez
(1)
George Yiu
(1)
Giorgio Severi
(1)
Hoang Le
(1)
Hyrum S. Anderson
(1)
Ilya Mironov
(1)
Ivan Motyashov
(1)
Jaiden Fairoze
(1)
Jamie Hayes
(2)
Jernej Kos
(1)
Jorge Chávez-Saab
(1)
Kai Wang
(2)
Katherine Lee
(1)
Kurt Thomas
(1)
Lei Li
(1)
Mathias Payer
(1)
Matthew Jagielski
(8)
Micah Sherr
(1)
Milad Nasr
(6)
Miranda Christ
(1)
Mohammad Mahmoody
(1)
Nicholas Carlini
(29)
Nicolas Papernot
(2)
Pratyush Mishra
(1)
Reza Shokri
(1)
Sadia Afroz
(2)
Saeed Mahloujifar
(1)
Sam Gunn
(1)
Samuel Deng
(1)
Sanghyun Hong
(2)
Sanjam Garg
(2)
Shuang Song
(2)
Somesh Jha
(2)
Steve Chien
(1)
Tavish Vaidya
(1)
Thomas R. Gross
(1)
Thomas Steinke
(1)
Tom B. Brown
(1)
Úlfar Erlingsson
(2)
Vikash Sehwag
(1)
Wenchao Zhou
(1)
Will Pearce
(1)
Xuandong Zhao
(1)
Yu-Xiang Wang
(1)
Yuankai Zhang
(1)
Yuval Elovici
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to