Shruti Tople
Shruti Tople
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Panoply: Low-TCB Linux Applications With SGX Enclaves.
S Shinde, D Le Tien, S Tople, P Saxena
NDSS, 2017
1962017
A traceability analysis of monero’s blockchain
A Kumar, C Fischer, S Tople, P Saxena
European Symposium on Research in Computer Security, 153-173, 2017
1452017
A uror: defending against poisoning attacks in collaborative deep learning systems
S Shen, S Tople, P Saxena
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
852016
Privado: Practical and secure DNN inference
S Tople, K Grover, S Shinde, R Bhagwan, R Ramjee
arXiv preprint arXiv:1810.00602, 2018
41*2018
Falcon: Honest-majority maliciously secure framework for private deep learning
S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin
Proceedings on Privacy Enhancing Technologies 2021 (1), 188-208, 2021
292021
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content
S Tople, S Shinde, Z Chen, P Saxena
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
282013
Protecting sensitive web content from client-side vulnerabilities with CRYPTONS
X Dong, Z Chen, H Siadati, S Tople, P Saxena, Z Liang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
242013
Domain generalization using causal matching
D Mahajan, S Tople, A Sharma
arXiv preprint arXiv:2006.07500, 2020
222020
On the trade-offs in oblivious execution techniques
S Tople, P Saxena
International Conference on Detection of Intrusions and Malware, and …, 2017
182017
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Y Jia, T Moataz, S Tople, P Saxena
USENIX Security Symposium, 945-962, 2016
162016
Podarch: Protecting legacy applications with a purely hardware tcb
S Shinde, S Tople, D Kathayat, P Saxena
National University of Singapore, Tech. Rep, 2015
152015
Analyzing information leakage of updates to natural language models
S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
11*2020
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption.
HW Lim, S Tople, P Saxena, EC Chang
IACR Cryptology ePrint Archive 2014, 539, 2014
112014
Alleviating Privacy Attacks via Causal Learning
S Tople, A Sharma, A Nori
International Conference on Machine Learning, 9537-9547, 2020
62020
Collaborative Machine Learning Markets with Data-Replication-Robust Payments
O Ohrimenko, S Tople, S Tschiatschek
arXiv preprint arXiv:1911.09052, 2019
62019
PermuteRam: Optimizing Oblivious Computation for Efficiency.
S Tople, H Dang, P Saxena, EC Chang
IACR Cryptology ePrint Archive 2017, 885, 2017
62017
PRO-ORAM: Practical Read-Only Oblivious {RAM}
S Tople, Y Jia, P Saxena
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
5*2019
Soteria: In search of efficient neural networks for private inference
A Aggarwal, TE Carlson, R Shokri, S Tople
arXiv preprint arXiv:2007.12934, 2020
42020
Dataset-level attribute leakage in collaborative learning
W Zhang, S Tople, O Ohrimenko
arXiv preprint arXiv:2006.07267, 2020
42020
An Empirical Study on the Intrinsic Privacy of SGD
SL Hyland, S Tople
arXiv preprint arXiv:1912.02919, 2019
4*2019
The system can't perform the operation now. Try again later.
Articles 1–20