Nasr, Milad
70  results:
Search for persons X
?
1

Membership Inference Attacks From First Principles:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
Carlini, Nicholas ; Chien, Steve ; Nasr, Milad... - p. 1897-1914 , 2022
 
?
2

Machine Learning with Differentially Private Labels: Mechan..:

Tang, Xinyu ; Nasr, Milad ; Mahloujifar, Saeed...
Proceedings on Privacy Enhancing Technologies.  2022 (2022)  4 - p. 332-350 , 2022
 
?
3

Adversary Instantiation: Lower Bounds for Differentially Pr..:

, In: 2021 IEEE Symposium on Security and Privacy (SP),
Nasr, Milad ; Songi, Shuang ; Thakurta, Abhradeep.. - p. 866-882 , 2021
 
?
4

Robust Adversarial Attacks Against DNN-Based Wireless Commu..:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
Bahramali, Alireza ; Nasr, Milad ; Houmansadr, Amir.. - p. 126-140 , 2021
 
?
5

Bidding strategies with gender nondiscrimination constraint..:

, In: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency,
Nasr, Milad ; Tschantz, Michael Carl - p. 337-347 , 2020
 
?
6

Machine Learning with Membership Privacy using Adversarial ..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Nasr, Milad ; Shokri, Reza ; Houmansadr, Amir - p. 634-646 , 2018
 
?
7

DeepCorr : Strong Flow Correlation Attacks on Tor Using ..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Nasr, Milad ; Bahramali, Alireza ; Houmansadr, Amir - p. 1962-1976 , 2018
 
?
8

The Waterfall of Liberty : Decoy Routing Circumvention t..:

, In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security,
Nasr, Milad ; Zolfaghari, Hadi ; Houmansadr, Amir - p. 2037-2052 , 2017
 
?
9

Compressive Traffic Analysis : A New Paradigm for Scalab..:

, In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security,
Nasr, Milad ; Houmansadr, Amir ; Mazumdar, Arya - p. 2053-2069 , 2017
 
?
10

GAME OF DECOYS : Optimal Decoy Routing Through Game Theo..:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
Nasr, Milad ; Houmansadr, Amir - p. 1727-1738 , 2016
 
1-15