Preprint Learning Fair Representations for Kernel Models 2019 Tan Z, Yeom S, Fredrikson M, Talwalkar A
Preprint Stolen Memories: Leveraging Model Memorization for Calibrated White-Box Membership Inference 2019 Leino K, Fredrikson M
Preprint Contextual and Granular Policy Enforcement in Database-backed Applications 2018 Bichhawat A, Fredrikson M, Yang J, Trehan A
Preprint Hunting for Discriminatory Proxies in Linear Regression Models 2018 Yeom S, Datta A, Fredrikson M
Journal Article Hunting for Discriminatory Proxies in Linear Regression Models 2018 • Advances in Neural Information Processing Systems • 31: Yeom S, Datta A, Fredrikson M
Preprint Influence-Directed Explanations for Deep Convolutional Networks 2018 Leino K, Sen S, Datta A, Fredrikson M, Li L
Journal Article Influence-Directed Explanations for Deep Convolutional Networks 2018 • International Test Conference Leino K, Sen S, Datta A, Fredrikson M, Li L
Journal Article Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting 2018 • Proceedings - IEEE Computer Security Foundations Symposium • 268-282 Yeom S, Giacomelli I, Fredrikson M, Jha S
Conference Quantitative underpinnings of secure, graceful degradation 2018 1-1 Wagner R, Garlan D, Fredrikson M
Preprint Verifying and Synthesizing Constant-Resource Implementations with Types 2018 Ngo VC, Dehesa-Azuara M, Fredrikson M, Hoffmann J
Journal Article Why Are They Collecting My Data? 2018 • Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies • 2(4):1-27 Jin H, Liu M, Dodhia K, Li Y, Srivastava G, Fredrikson M, Agarwal Y, Hong JI
Preprint Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting 2017 Yeom S, Giacomelli I, Fredrikson M, Jha S
Journal Article PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage 2017 Srivastava G, Bhuwalka K, Sahoo SK, Chitkara S, Ku K, Fredrikson M, Hong J, Agarwal Y
Journal Article PrivacyStreams 2017 • Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies • 1(3):1-26 Li Y, Chen F, Li TJ-J, Guo Y, Huang G, Fredrikson M, Agarwal Y, Hong JI
Journal Article Proxy Non-Discrimination in Data-Driven Systems 2017 Datta A, Fredrikson M, Ko G, Mardziel P, Sen S
Preprint Proxy Non-Discrimination in Data-Driven Systems 2017 Datta A, Fredrikson M, Ko G, Mardziel P, Sen S
Journal Article Use Privacy in Data-Driven Systems Theory and Experiments with Machine Learnt Programs 2017 • Proceedings of the ACM Conference on Computer and Communications Security • 1193-1210 Datta A, Fredrikson M, Ko G, Mardziel P, Sen S
Preprint Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs 2017 Datta A, Fredrikson M, Ko G, Mardziel P, Sen S
Conference Verifying and Synthesizing Constant-Resource Implementations with Types 2017 • IEEE Symposium on Security and Privacy: Proceedings • 710-728 Van CN, Dehesa-Azuara M, Fredrikson M, Hoffmann J
Conference A Methodology for Formalizing Model-Inversion Attacks 2016 • Proceedings of the Computer Security Foundations Workshop • 355-370 Wu X, Fredrikson M, Jha S, Naughton JF
Conference The Limitations of Deep Learning in Adversarial Settings 2016 • 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY • 372-387 Papernot N, McDaniel P, Jha S, Fredrikson M, Celik ZB, Swami A