Follow
Fnu Suya
Fnu Suya
University of Maryland, College Park
Verified email at virginia.edu - Homepage
Title
Cited by
Cited by
Year
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries
F Suya, J Chi, D Evans, Y Tian
USENIX Security Symposium 2020, 2020
842020
Scalable attack on graph data by injecting vicious nodes
J Wang, M Luo, F Suya, J Li, Z Yang, Q Zheng
Data Mining and Knowledge Discovery 34, 1363-1389, 2020
682020
Model-Targeted Poisoning Attacks with Provable Convergence
F Suya, S Mahloujifar, A Suri, D Evans, Y Tian
International Conference on Machine Learning (ICML) 2021, 2021
42*2021
Demystifying Hidden Privacy Settings in Mobile Apps
YT Yi Chen, Kai Chen, XiaoFeng Wang, Wei Zou, Mingming Zha, Nan Zhang ...
40th IEEE Symposium on Security and Privacy (Oakland), 2019
31*2019
Query-limited black-box attacks to classifiers
F Suya, Y Tian, D Evans, P Papotti
NIPS Workshop on Machine Learning and Computer Security, 2017
222017
Stealthy Backdoors as Compression Artifacts
Y Tian, F Suya, F Xu, D Evans
arXiv preprint arXiv:2104.15129, 2021
142021
Sok: Pitfalls in evaluating black-box attacks
F Suya, A Suri, T Zhang, J Hong, Y Tian, D Evans
arXiv preprint arXiv:2310.17534, 2023
42023
Manipulating transfer learning for property inference
Y Tian, F Suya, A Suri, F Xu, D Evans
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
42023
What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
F Suya, X Zhang, Y Tian, D Evans
Advances in neural information processing systems 36, 2024
22024
When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
F Suya, X Zhang, Y Tian, D Evans
arXiv preprint arXiv:2307.01073, 2023
12023
HackWrt: Network Traffic-Based Eavesdropping of Handwriting
A Kinfe, C Jung, K Lin, M Clyburn, F Suya
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 55-60, 2023
2023
Poster: Adversaries Don’t Care About Averages: Batch Attacks on Black-Box Classifiers
F Suya, D Evans, Y Tian
IEEE Symposium on Security and Privacy (Poster), 2018
2018
Optimal stochastic power control with compressive CSI acquisition for Cloud-RAN
Y Shi, B Bai, W Chen, J Zhang, KB Letaief, S Zhou
2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2016
2016
Optimal stochastic power control with compressive CSI acquisition for Cloud-RAN
SZ Fnu Suya, Yuanming Shi, Bo Bai, Wei Chen, Jun Zhang, Khaled B. Letaief
2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2016
2016
Teaching Statement
F Durand
Understanding the Limits of Data Poisoning Attacks Data poisoning attacks, which inject malicious data into the victim’s training set, have progressed from indiscriminate …
F Suya
The system can't perform the operation now. Try again later.
Articles 1–16