Saurabh Shintre
Saurabh Shintre
Principal Researcher, NortonLifeLock Research Group
Verified email at nortonlifelock.com
Title
Cited by
Cited by
Year
Detecting adversarial samples from artifacts
R Feinman, RR Curtin, S Shintre, AB Gardner
arXiv preprint arXiv:1703.00410, 2017
3862017
" Real" and" complex" network codes: promises and challenges
S Shintre, S Katti, S Jaggi, BK Dey, D Katabi, M Medard
2008 Fourth Workshop on Network Coding, Theory and Applications, 1-6, 2008
382008
How feasible is network coding in current satellite systems?
F Vieira, S Shintre, J Barros
2010 5th Advanced Satellite Multimedia Systems Conference and the 11th …, 2010
342010
Real network codes
S Katti, S Shintre, S Jaggi, D Katabi, M Medard
Proc. Forty-Fifth Annual Allerton Conference, 389-395, 2007
302007
Probabilistic key distribution in vehicular networks with infrastructure support
J Almeida, S Shintre, M Boban, J Barros
2012 IEEE Global Communications Conference (GLOBECOM), 973-978, 2012
162012
{SEAL}: Attack Mitigation for Encrypted Databases via Adjustable Leakage
I Demertzis, D Papadopoulos, C Papamanthou, S Shintre
29th {USENIX} Security Symposium ({USENIX} Security 20), 2020
62020
Systems and methods for protecting computing resources
S Shintre, A Parker-Wood
US Patent 10,015,182, 2018
6*2018
Detecting adversarial samples from artifacts. arXiv preprint (2017)
R Feinman, RR Curtin, S Shintre, AB Gardner
arXiv preprint arXiv:1703.00410, 2017
52017
Adversarial machine learning at scale
R Feinman, RR Curtin, S Shintre, AB Gardner
technical Report, 2016
52016
Verifying that the influence of a user data point has been removed from a machine learning classifier
S Shintre, J Dhaliwal
US Patent 10,225,277, 2019
42019
Systems and methods for protecting computing resources
S Shintre, A Parker-Wood
US Patent 10,015,182, 2018
42018
Probabilistic key distribution in vehicular networks with infrastructure support
JFCDO Barros, JPP De Almeida, M Boban, S Shintre
US Patent 9,276,743, 2016
42016
Gradient similarity: An explainable approach to detect adversarial attacks against deep learning
J Dhaliwal, S Shintre
arXiv preprint arXiv:1806.10707, 2018
32018
Anonymity leakage in private VoIP networks
S Shintre, V Gligor, J ao Barros
IEEE Transactions on Dependable and Secure Computing 15 (1), 14-26, 2015
32015
Generalized delay-secrecy-throughput trade-offs in mobile ad-hoc networks
S Shintre, L Sassatelli, J Barros
2011 IEEE-APS Topical Conference on Antennas and Propagation in Wireless …, 2011
32011
Analog network coding
S Katti, S Shintre, S Jaggi, D Katabi, M Medard
In ACM SIGCOMM, 2007
32007
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
M Sharif, K Lucas, L Bauer, MK Reiter, S Shintre
arXiv preprint arXiv:1912.09064, 2019
22019
Security for IoT Home Voice Assistants
SK Nanda, Y Sun, S Shintre
US Patent App. 15/969,193, 2019
22019
Making Machine Learning Forget
S Shintre, KA Roundy, J Dhaliwal
Annual Privacy Forum, 72-83, 2019
22019
Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices
Y Zou, K Roundy, A Tamersoy, S Shintre, J Roturier, F Schaub
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20