Florian Tramèr
Florian Tramèr
PhD candidate, Stanford
Verified email at cs.stanford.edu - Homepage
TitleCited byYear
Ensemble Adversarial Training: Attacks and Defenses
F Tramèr, A Kurakin, N Papernot, I Goodfellow, D Boneh, P McDaniel
International Conference on Learning Representations (ICLR), 2018
Stealing machine learning models via prediction apis
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th {USENIX} Security Symposium ({USENIX} Security 16), 601-618, 2016
The space of transferable adversarial examples
F Tramèr, N Papernot, I Goodfellow, D Boneh, P McDaniel
arXiv preprint arXiv:1704.03453, 2017
Physical adversarial examples for object detectors
D Song, K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, F Tramer, ...
12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), 2018
Differential privacy with bounded priors: reconciling utility and privacy in genome-wide association studies
F Tramèr, Z Huang, JP Hubaux, E Ayday
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
FairTest: Discovering unwarranted associations in data-driven applications
F Tramer, V Atlidakis, R Geambasu, D Hsu, JP Hubaux, M Humbert, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 401-416, 2017
Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge
F Tramer, F Zhang, H Lin, JP Hubaux, A Juels, E Shi
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 19-34, 2017
On evaluating adversarial robustness
N Carlini, A Athalye, N Papernot, W Brendel, J Rauber, D Tsipras, ...
arXiv preprint arXiv:1902.06705, 2019
Formal abstractions for attested execution secure processors
R Pass, E Shi, F Tramer
Annual International Conference on the Theory and Applications of …, 2017
Better algorithms for LWE and LWR
A Duc, F Tramer, S Vaudenay
Annual International Conference on the Theory and Applications of …, 2015
Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks
JL Raisaro, F Tramer, Z Ji, D Bu, Y Zhao, K Carey, D Lloyd, H Sofia, ...
Journal of the American Medical Informatics Association 24 (4), 799-805, 2017
On solving LPN using BKW and variants
S Bogos, F Tramer, S Vaudenay
Cryptography and Communications 8 (3), 331-369, 2016
Privateride: A privacy-enhanced ride-hailing service
A Pham, I Dacosta, B Jacot-Guillarmod, K Huguenin, T Hajar, F Tramèr, ...
Proceedings on Privacy Enhancing Technologies 2017 (2), 38-56, 2017
Slalom: Fast, verifiable and private execution of neural networks in trusted hardware
F Tramèr, D Boneh
International Conference on Learning Representations (ICLR), 2019
Enter the hydra: Towards principled bug bounties and exploit-resistant smart contracts
L Breindenbach, P Daian, F Tramèr, A Juels
27th {USENIX} Security Symposium ({USENIX} Security 18), 1335-1352, 2018
Sentinet: Detecting physical attacks against deep learning systems
E Chou, F Tramèr, G Pellegrino, D Boneh
arXiv preprint arXiv:1812.00292, 2018
Adversarial Training and Robustness for Multiple Perturbations
F Tramèr, D Boneh
arXiv preprint arXiv:1904.13000, 2019
Exploiting excessive invariance caused by norm-bounded adversarial robustness
JH Jacobsen, J Behrmannn, N Carlini, F Tramer, N Papernot
arXiv preprint arXiv:1903.10484, 2019
Ad-versarial: Perceptual Ad-Blocking meets Adversarial Machine Learning
F Tramèr, P Dupré, G Rusak, G Pellegrino, D Boneh
arXiv preprint arXiv:1811.03194, 2018
PING and REJECT: The Impact of Side-Channels on Zcash Privacy
F Tramer, D Boneh, KG Paterson
The system can't perform the operation now. Try again later.
Articles 1–20