Follow
Saurabh Shintre
Saurabh Shintre
Principal Researcher, NortonLifeLock Research Group
Verified email at nortonlifelock.com
Title
Cited by
Cited by
Year
Detecting adversarial samples from artifacts
R Feinman, RR Curtin, S Shintre, AB Gardner
arXiv preprint arXiv:1703.00410, 2017
9892017
{SEAL}: Attack mitigation for encrypted databases via adjustable leakage
I Demertzis, D Papadopoulos, C Papamanthou, S Shintre
29th USENIX security symposium (USENIX Security 20), 2433-2450, 2020
832020
Examining the adoption and abandonment of security, privacy, and identity theft protection practices
Y Zou, K Roundy, A Tamersoy, S Shintre, J Roturier, F Schaub
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
642020
Malware makeover: Breaking ml-based static analysis by modifying executable bytes
K Lucas, M Sharif, L Bauer, MK Reiter, S Shintre
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
522021
" Real" and" complex" network codes: promises and challenges
S Shintre, S Katti, S Jaggi, BK Dey, D Katabi, M Medard
2008 Fourth Workshop on Network Coding, Theory and Applications, 1-6, 2008
402008
How feasible is network coding in current satellite systems?
F Vieira, S Shintre, J Barros
2010 5th Advanced Satellite Multimedia Systems Conference and the 11th …, 2010
352010
Systems and methods for protecting computing resources
S Shintre, A Parker-Wood
US Patent 10,015,182, 2018
322018
Real network codes
S Katti, S Shintre, S Jaggi, D Katabi, M Medard
Proc. Forty-Fifth Annual Allerton Conference, 389-395, 2007
322007
Systems and methods for protecting computing resources
S Shintre, A Parker-Wood
US Patent 10,015,182, 2018
302018
Security for IoT home voice assistants
SK Nanda, Y Sun, S Shintre
US Patent 10,887,351, 2021
282021
Detecting adversarial samples from artifacts. arXiv 2017
R Feinman, RR Curtin, S Shintre, AB Gardner
arXiv preprint arXiv:1703.00410, 0
28
Probabilistic key distribution in vehicular networks with infrastructure support
J Almeida, S Shintre, M Boban, J Barros
2012 IEEE Global Communications Conference (GLOBECOM), 973-978, 2012
242012
Making machine learning forget
S Shintre, KA Roundy, J Dhaliwal
Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome …, 2019
152019
Gradient similarity: An explainable approach to detect adversarial attacks against deep learning
J Dhaliwal, S Shintre
arXiv preprint arXiv:1806.10707, 2018
152018
Optimization-guided binary diversification to mislead neural networks for malware detection
M Sharif, K Lucas, L Bauer, MK Reiter, S Shintre
arXiv e-prints, arXiv: 1912.09064, 2019
142019
Verifying that the influence of a user data point has been removed from a machine learning classifier
S Shintre, J Dhaliwal
US Patent 10,225,277, 2019
112019
Probabilistic key distribution in vehicular networks with infrastructure support
JFCDEO BARROS, JPP DE ALMEIDA, M Boban, S Shintre
92014
Decrypting network traffic on a middlebox device using a trusted execution environment
Y Sun, D Marino, SK Nanda, S Shintre, BT Witten, RA Frederick, Q Li
US Patent 10,447,663, 2019
82019
Automatically detecting insider threats using user collaboration patterns
S Bhatkar, S Shintre, A Kayyoor
US Patent 10,341,373, 2019
72019
Insider threat detection under user-resource bi-partite graphs
S Shintre, S Bhatkar, AK Kayyoor
US Patent 10,686,816, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20