1 code implementation • 31 May 2019 • Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart
Current widely deployed C3 services have the user share a small prefix of a hash computed over the user's password.
Cryptography and Security
1 code implementation • 22 Sep 2017 • Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov
In this setting, we design and implement practical algorithms, some of them very similar to standard ML techniques such as regularization and data augmentation, that "memorize" information about the training dataset in the model yet the model is as accurate and predictive as a conventionally trained model.
1 code implementation • 9 Sep 2016 • Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
In such attacks, an adversary with black-box access, but no prior knowledge of an ML model's parameters or training data, aims to duplicate the functionality of (i. e., "steal") the model.
no code implementations • 13 May 2016 • Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton
In this survey, we give an overview of network traffic obfuscation and its role in circumventing Internet censorship.
Networking and Internet Architecture Cryptography and Security C.2