Follow
Somesh Jha
Somesh Jha
Lubar Chair of Computer Science, University of Wisconsin
Verified email at cs.wisc.edu
Title
Cited by
Cited by
Year
The limitations of deep learning in adversarial settings
N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami
2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016
46022016
Practical black-box attacks against machine learning
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
38962017
Distillation as a defense to adversarial perturbations against deep neural networks
N Papernot, P McDaniel, X Wu, S Jha, A Swami
2016 IEEE symposium on security and privacy (SP), 582-597, 2016
35532016
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
29352015
Counterexample-guided abstraction refinement
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Computer Aided Verification: 12th International Conference, CAV 2000 …, 2000
26262000
Automated generation and analysis of attack graphs
O Sheyner, J Haines, S Jha, R Lippmann, JM Wing
Proceedings 2002 IEEE Symposium on Security and Privacy, 273-284, 2002
19162002
Counterexample-guided abstraction refinement for symbolic model checking
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Journal of the ACM (JACM) 50 (5), 752-794, 2003
12912003
Semantics-aware malware detection
M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant
2005 IEEE symposium on security and privacy (S&P'05), 32-46, 2005
11522005
Static analysis of executables to detect malicious patterns
M Christodorescu, S Jha
12th USENIX Security Symposium (USENIX Security 03), 2003
10522003
Privacy risk in machine learning: Analyzing the connection to overfitting
S Yeom, I Giacomelli, M Fredrikson, S Jha
2018 IEEE 31st computer security foundations symposium (CSF), 268-282, 2018
10132018
Privacy in pharmacogenetics: An {End-to-End} case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
23rd USENIX security symposium (USENIX Security 14), 17-32, 2014
9912014
Two formal analyses of attack graphs
S Jha, O Sheyner, J Wing
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 49-63, 2002
8362002
Exploiting symmetry in temporal logic model checking
EM Clarke, R Enders, T Filkorn, S Jha
Formal methods in system design 9, 77-104, 1996
7121996
Modular verification of software components in C
S Chaki, EM Clarke, A Groce, S Jha, H Veith
IEEE Transactions on Software Engineering 30 (6), 388-402, 2004
6802004
Mining specifications of malicious behavior
M Christodorescu, S Jha, C Kruegel
Proceedings of the the 6th joint meeting of the European software …, 2007
6332007
Effective {Inter-Component} communication mapping in android: An essential step towards holistic security analysis
D Octeau, P McDaniel, S Jha, A Bartel, E Bodden, J Klein, Y Le Traon
22nd USENIX Security Symposium (USENIX Security 13), 543-558, 2013
5712013
Locally differentially private protocols for frequency estimation
T Wang, J Blocki, N Li, S Jha
26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017
5512017
Practical black-box attacks against deep learning systems using adversarial examples
N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami
arXiv preprint arXiv:1602.02697 1 (2), 3, 2016
4972016
Testing malware detectors
M Christodorescu, S Jha
ACM SIGSOFT Software Engineering Notes 29 (4), 34-44, 2004
4862004
Verification of the Futurebus+ cache coherence protocol
EM Clarke, O Grumberg, H Hiraishi, S Jha, DE Long, KL McMillan, ...
Computer Hardware Description Languages and Their Applications, 15-30, 1993
4411993
Global intrusion detection in the domino overlay system
V Yegneswaran, P Barford, S Jha
University of Wisconsin-Madison Department of Computer Sciences, 2003
4312003
Towards automatic generation of vulnerability-based signatures
D Brumley, J Newsome, D Song, H Wang, S Jha
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-16, 2006
4132006
Deflating the big bang: fast and scalable deep packet inspection with extended finite automata
R Smith, C Estan, S Jha, S Kong
Proceedings of the ACM SIGCOMM 2008 conference on Data communication, 207-218, 2008
3602008
Progress on the state explosion problem in model checking
E Clarke, O Grumberg, S Jha, Y Lu, H Veith
Informatics: 10 Years Back, 10 Years Ahead, 176-194, 2001
3562001
Omniunpack: Fast, generic, and safe unpacking of malware
L Martignoni, M Christodorescu, S Jha
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
3452007
A semantics-based approach to malware detection
MD Preda, M Christodorescu, S Jha, S Debray
ACM SIGPLAN Notices 42 (1), 377-388, 2007
3442007
Privacy at scale: Local differential privacy in practice
G Cormode, S Jha, T Kulkarni, N Li, D Srivastava, T Wang
Proceedings of the 2018 International Conference on Management of Data, 1655 …, 2018
2832018
Efficient Context-Sensitive Intrusion Detection.
JT Giffin, S Jha, BP Miller
NDSS, 2004
2812004
{FIE} on firmware: Finding vulnerabilities in embedded systems using symbolic execution
D Davidson, B Moench, T Ristenpart, S Jha
22nd USENIX Security Symposium (USENIX Security 13), 463-478, 2013
2782013
Synthesizing near-optimal malware specifications from suspicious behaviors
M Fredrikson, S Jha, M Christodorescu, R Sailer, X Yan
2010 IEEE Symposium on Security and Privacy, 45-60, 2010
2742010
Bolt-on differential privacy for scalable stochastic gradient descent-based analytics
X Wu, F Li, A Kumar, K Chaudhuri, S Jha, J Naughton
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
2722017
Towards practical privacy for genomic computation
S Jha, L Kruger, V Shmatikov
2008 IEEE Symposium on Security and Privacy (sp 2008), 216-230, 2008
2722008
An Architecture for Generating Semantic Aware Signatures.
V Yegneswaran, JT Giffin, P Barford, S Jha
USENIX security symposium, 97-112, 2005
2722005
XFA: Faster signature matching with extended automata
R Smith, C Estan, S Jha
2008 IEEE Symposium on Security and Privacy (sp 2008), 187-201, 2008
2702008
Weighted pushdown systems and their application to interprocedural dataflow analysis
T Reps, S Schwoon, S Jha, D Melski
Science of Computer Programming 58 (1-2), 206-263, 2005
2662005
Symmetry reductions in model checking
EM Clarke, EA Emerson, S Jha, AP Sistla
Computer Aided Verification: 10th International Conference, CAV'98 Vancouver …, 1998
2661998
Privacy preserving clustering
S Jha, L Kruger, P McDaniel
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
2652005
Composite constant propagation: Application to android inter-component communication analysis
D Octeau, D Luchaup, M Dering, S Jha, P McDaniel
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
2632015
Efficient filtering in publish-subscribe systems using binary decision diagrams
A Campailla, S Chaki, E Clarke, S Jha, H Veith
Proceedings of the 23rd International Conference on Software Engineering …, 2001
2542001
Formalizing sensitivity in static analysis for intrusion detection
HH Feng, JT Giffin, Y Huang, S Jha, W Lee, BP Miller
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 194-208, 2004
2522004
The system can't perform the operation now. Try again later.
Articles 1–40