Asokan, N.
76  results:
Search for persons X
?
1

Data-Oblivious ML Accelerators Using Hardware Security Exte..:

, In: 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
 
?
2

S2malloc: Statistically Secure Allocator for Use-After-Free..:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
Wang, Ruizhe ; Xu, Meng ; Asokan, N. - p. 23-43 , 2024
 
?
3

A User-Centered Security Evaluation of Copilot:

, In: 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE),
Asare, Owura ; Asokan, N. ; Nagappan, Meiyappan - p. 1947-1957 , 2024
 
?
4

A User-centered Security Evaluation of Copilot:

, In: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering,
 
?
5

Model Stealing Attacks and Defenses: Where Are We Now?:

, In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security,
Asokan, N. - p. 327 ff. , 2023
 
?
6

On the Effectiveness of Dataset Watermarking:

, In: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics,
Atli Tekgul, Buse Gul ; Asokan, N. - p. 93-99 , 2022
 
?
7

Towards cryptographically-authenticated in-memory data stru..:

, In: 2022 IEEE Secure Development Conference (SecDev),
 
?
8

Real-Time Adversarial Perturbations Against Deep Reinforcem..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
 
?
9

DAWN : Dynamic Adversarial Watermarking of Neural Networ..:

, In: Proceedings of the 29th ACM International Conference on Multimedia,
 
?
10

Lux : Enabling Ephemeral Authorization for Display-Limit..:

, In: Proceedings of the International Conference on Internet-of-Things Design and Implementation,
 
?
11

Tutorial: Investigating Advanced Exploits for System Securi..:

, In: 2021 IEEE Secure Development Conference (SecDev),
 
?
12

Investigating targeted espionage: Methods, findings, implic..:

, In: 2021 IEEE International Symposium on Technology and Society (ISTAS),
 
?
13

Extraction of Complex DNN Models: Real Threat or Boogeyman?:

, In: Communications in Computer and Information Science; Engineering Dependable and Secure Machine Learning Systems,
 
?
14

Authenticated Call Stack:

, In: Proceedings of the 56th Annual Design Automation Conference 2019,
 
?
15

Making Targeted Black-box Evasion Attacks Effective and Eff..:

, In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security,
Juuti, Mika ; Gul Atli, Buse ; Asokan, N. - p. 83-94 , 2019
 
1-15