Briland Hitaj
Title
Cited by
Cited by
Year
Deep models under the GAN: information leakage from collaborative deep learning
B Hitaj, G Ateniese, F Perez-Cruz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3392017
Passgan: A deep learning approach for password guessing
B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
International Conference on Applied Cryptography and Network Security, 217-237, 2019
722019
No Place to Hide that Bytes Won’t Reveal: Sniffing Location-Based Encrypted Traffic to Track a User’s Position
G Ateniese, B Hitaj, LV Mancini, NV Verde, A Villani
Network and System Security: 9th International Conference, NSS 2015, New …, 2015
132015
Scratch that! An evolution-based adversarial attack against neural networks
M Jere, B Hitaj, G Ciocarlie, F Koushanfar
arXiv preprint arXiv:1912.02316, 2019
22019
Evasion attacks against watermarking techniques found in mlaas systems
D Hitaj, B Hitaj, LV Mancini
2019 Sixth International Conference on Software Defined Systems (SDS), 55-63, 2019
22019
What are GANs useful for?
B Hitaj, PM Olmos, P Gasti, G Ateniese, F Pérez-Cruz
1
System and process for generating passwords or password guesses
B Hitaj, G Ateniese, F Perez-Cruz, P Gasti
US Patent App. 16/557,416, 2020
2020
WHAT ARE GANS USEFUL FOR?
PM Olmos, B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
2018
Applying Mobile Technology for a Pervasive University Information System
B Hitaj, I Hakrama
International Journal on ICT Education, Knowledge Society & Open Governance …, 2014
2014
Using Gravitational Force in Terrain Optimization Problems
E Terolli, B Hitaj, O Altun
GAU Journal of Social & Applied Sciences 6 (10), 73-78, 2014
2014
Applying Mobile Technology for a Pervasive University Information System
B Hitaj
Epoka University, 2013
2013
Vice Chair/Registration
A Cárdenas, M Gondree, R Bobba, B Hitaj, B Copos, I Agadakos, ...
The system can't perform the operation now. Try again later.
Articles 1–12