Search Results for author: Thomas Ristenpart

Found 4 papers, 3 papers with code

Protocols for Checking Compromised Credentials

1 code implementation31 May 2019 Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart

Current widely deployed C3 services have the user share a small prefix of a hash computed over the user's password.

Cryptography and Security

Machine Learning Models that Remember Too Much

1 code implementation22 Sep 2017 Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov

In this setting, we design and implement practical algorithms, some of them very similar to standard ML techniques such as regularization and data augmentation, that "memorize" information about the training dataset in the model yet the model is as accurate and predictive as a conventionally trained model.

BIG-bench Machine Learning Data Augmentation +2

Stealing Machine Learning Models via Prediction APIs

1 code implementation9 Sep 2016 Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart

In such attacks, an adversary with black-box access, but no prior knowledge of an ML model's parameters or training data, aims to duplicate the functionality of (i. e., "steal") the model.

BIG-bench Machine Learning Learning Theory +1

Network Traffic Obfuscation and Automated Internet Censorship

no code implementations13 May 2016 Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton

In this survey, we give an overview of network traffic obfuscation and its role in circumventing Internet censorship.

Networking and Internet Architecture Cryptography and Security C.2

Cannot find the paper you are looking for? You can Submit a new open access paper.