


Остановите войну!
for scientists:


default search action
Michael Backes 0001
Person information

- affiliation: CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- affiliation: Saarland University, Computer Science Department, Saarbrücken, Germany
Other persons with the same name
- Michael Backes 0002
— University of Namibia, Department of Physics, Windhoek, Namibia (and 1 more)
- Michael Backes 0003 — Los Angeles, CA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j32]Michael Thomas Smith
, Kathrin Grosse, Michael Backes, Mauricio A. Álvarez:
Adversarial vulnerability bounds for Gaussian process classification. Mach. Learn. 112(3): 971-1009 (2023) - [j31]Giorgio Di Tizio
, Patrick Speicher
, Milivoj Simeonovski
, Michael Backes
, Ben Stock
, Robert Künnemann
:
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. ACM Trans. Priv. Secur. 26(2): 18:1-18:36 (2023) - [c244]Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Backdoor Attacks Against Dataset Distillation. NDSS 2023 - [c243]Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel:
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites. NDSS 2023 - [c242]Hamed Rasifard
, Rahul Gopinath
, Michael Backes
, Hamed Nemati
:
SEAL: Capability-Based Access Control for Data-Analytic Scenarios. SACMAT 2023: 67-78 - [i132]Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Backdoor Attacks Against Dataset Distillation. CoRR abs/2301.01197 (2023) - [i131]Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang:
Prompt Stealing Attacks Against Text-to-Image Generation Models. CoRR abs/2302.09923 (2023) - [i130]Ziqing Yang, Zeyang Sha, Michael Backes, Yang Zhang:
From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All You Need. CoRR abs/2303.05266 (2023) - [i129]Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang:
MGTBench: Benchmarking Machine-Generated Text Detection. CoRR abs/2303.14822 (2023) - [i128]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Yang Zhang:
FACE-AUDITOR: Data Auditing in Facial Recognition Systems. CoRR abs/2304.02782 (2023) - [i127]Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang:
In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT. CoRR abs/2304.08979 (2023) - [i126]Wai Man Si, Michael Backes, Yang Zhang, Ahmed Salem:
Two-in-One: A Model Hijacking Attack Against Text Generation Models. CoRR abs/2305.07406 (2023) - [i125]Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Watermarking Diffusion Model. CoRR abs/2305.12502 (2023) - [i124]Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang:
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. CoRR abs/2305.13873 (2023) - 2022
- [j30]Kathrin Grosse
, Taesung Lee, Battista Biggio
, Youngja Park, Michael Backes, Ian M. Molloy:
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. Comput. Secur. 120: 102814 (2022) - [c241]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
Graph Unlearning. CCS 2022: 499-513 - [c240]Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang:
On the Privacy Risks of Cell-Based NAS Architectures. CCS 2022: 1427-1441 - [c239]Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Auditing Membership Leakages of Multi-Exit Networks. CCS 2022: 1917-1931 - [c238]Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang:
Membership Inference Attacks by Exploiting Loss Trajectory. CCS 2022: 2085-2098 - [c237]Trung Tin Nguyen, Michael Backes, Ben Stock:
Freely Given Consent?: Studying Consent Notice of Third-Party Tracking and Its Violations of GDPR in Android Apps. CCS 2022: 2369-2383 - [c236]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CCS 2022: 2643-2657 - [c235]Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang:
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots. CCS 2022: 2659-2673 - [c234]Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov:
A Framework for Constructing Single Secret Leader Election from MPC. ESORICS (2) 2022: 672-691 - [c233]Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang:
Dynamic Backdoor Attacks Against Machine Learning Models. EuroS&P 2022: 703-718 - [c232]Xinyue Shen, Xinlei He, Michael Backes, Jeremy Blackburn, Savvas Zannettou, Yang Zhang:
On Xing Tian and the Perseverance of Anti-China Sentiment Online. ICWSM 2022: 944-955 - [c231]Ahmed Salem, Michael Backes, Yang Zhang:
Get a Model! Model Hijacking Attack Against Machine Learning Models. NDSS 2022 - [c230]Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz:
Industrial practitioners' mental models of adversarial machine learning. SOUPS @ USENIX Security Symposium 2022: 97-116 - [c229]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. USENIX Security Symposium 2022: 4525-4542 - [c228]Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:
Inference Attacks Against Graph Neural Networks. USENIX Security Symposium 2022: 4543-4560 - [i123]Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders. CoRR abs/2201.07513 (2022) - [i122]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CoRR abs/2204.06963 (2022) - [i121]Xinyue Shen, Xinlei He, Michael Backes, Jeremy Blackburn, Savvas Zannettou, Yang Zhang:
On Xing Tian and the Perseverance of Anti-China Sentiment Online. CoRR abs/2204.08935 (2022) - [i120]Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Auditing Membership Leakages of Multi-Exit Networks. CoRR abs/2208.11180 (2022) - [i119]Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang:
Membership Inference Attacks by Exploiting Loss Trajectory. CoRR abs/2208.14933 (2022) - [i118]Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang:
On the Privacy Risks of Cell-Based NAS Architectures. CoRR abs/2209.01688 (2022) - [i117]Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang:
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots. CoRR abs/2209.03463 (2022) - [i116]Ziqing Yang, Xinlei He, Zheng Li, Michael Backes, Mathias Humbert, Pascal Berrang, Yang Zhang:
Data Poisoning Attacks Against Multimodal Encoders. CoRR abs/2209.15266 (2022) - [i115]Haiming Wang, Zhikun Zhang, Tianhao Wang, Shibo He, Michael Backes, Jiming Chen, Yang Zhang:
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model. CoRR abs/2210.00581 (2022) - [i114]Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang:
UnGANable: Defending Against GAN-based Face Manipulation. CoRR abs/2210.00957 (2022) - [i113]Yixin Wu, Ning Yu, Zheng Li, Michael Backes, Yang Zhang:
Membership Inference Attacks Against Text-to-image Generation Models. CoRR abs/2210.00968 (2022) - [i112]Xinyue Shen, Xinlei He, Zheng Li, Yun Shen, Michael Backes, Yang Zhang:
Backdoor Attacks in the Supply Chain of Masked Image Modeling. CoRR abs/2210.01632 (2022) - [i111]Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel:
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version). CoRR abs/2210.09373 (2022) - [i110]Zhengyu Zhao, Hanwei Zhang, Renjue Li, Ronan Sicre, Laurent Amsaleg, Michael Backes:
Towards Good Practices in Evaluating Transfer Adversarial Attacks. CoRR abs/2211.09565 (2022) - [i109]Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang, Savvas Zannettou:
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. CoRR abs/2212.06573 (2022) - [i108]Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov:
A framework for constructing Single Secret Leader Election from MPC. IACR Cryptol. ePrint Arch. 2022: 1040 (2022) - 2021
- [c227]Xiaoyi Chen
, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang:
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements. ACSAC 2021: 554-569 - [c226]Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes:
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps. AsiaCCS 2021: 578-592 - [c225]Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
When Machine Unlearning Jeopardizes Privacy. CCS 2021: 896-911 - [c224]Aurore Fass, Dolière Francis Somé, Michael Backes, Ben Stock:
DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale. CCS 2021: 1789-1804 - [c223]Sebastian Roth, Lea Gröber, Michael Backes, Katharina Krombholz, Ben Stock:
12 Angry Developers - A Qualitative Study on Developers' Struggles with CSP. CCS 2021: 3085-3103 - [c222]Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in the Decentralised-Adversary Setting. CSF 2021: 1-16 - [c221]Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Maximilian Augustin, Michael Backes, Mario Fritz:
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service. CVPR Workshops 2021: 3300-3309 - [c220]Marvin Moog, Markus Demmel, Michael Backes, Aurore Fass:
Statically Detecting JavaScript Obfuscation and Minification Techniques in the Wild. DSN 2021: 569-580 - [c219]Kathrin Grosse, Michael Backes:
Do winning tickets exist before DNN training? SDM 2021: 549-557 - [c218]Yusra Elbitar, Michael Schilling, Trung Tin Nguyen, Michael Backes, Sven Bugiel:
Explanation Beats Context: The Effect of Timing & Rationales on Users' Runtime Permission Decisions. USENIX Security Symposium 2021: 785-802 - [c217]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. USENIX Security Symposium 2021: 929-946 - [c216]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. USENIX Security Symposium 2021: 2669-2686 - [c215]Jie Huang, Michael Backes, Sven Bugiel:
A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android. USENIX Security Symposium 2021: 3631-3648 - [c214]Trung Tin Nguyen, Michael Backes, Ninja Marnau, Ben Stock:
Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit Consent in Android Apps. USENIX Security Symposium 2021: 3667-3684 - [c213]Marten Oltrogge, Nicolas Huaman, Sabrina Amft, Yasemin Acar, Michael Backes, Sascha Fahl:
Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android Applications. USENIX Security Symposium 2021: 4347-4364 - [i107]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. CoRR abs/2102.02551 (2021) - [i106]Xinlei He, Rui Wen, Yixin Wu, Michael Backes, Yun Shen, Yang Zhang:
Node-Level Membership Inference Attacks Against Graph Neural Networks. CoRR abs/2102.05429 (2021) - [i105]Min Chen
, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
Graph Unlearning. CoRR abs/2103.14991 (2021) - [i104]Lukas Bieringer, Kathrin Grosse, Michael Backes, Katharina Krombholz:
Mental Models of Adversarial Machine Learning. CoRR abs/2105.03726 (2021) - [i103]Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:
Inference Attacks Against Graph Neural Networks. CoRR abs/2110.02631 (2021) - [i102]Oliver Schranz, Sebastian Weisgerber, Erik Derr, Michael Backes, Sven Bugiel:
Towards a Principled Approach for Dynamic Analysis of Android's Middleware. CoRR abs/2110.05619 (2021) - [i101]Ahmed Salem, Michael Backes, Yang Zhang:
Get a Model! Model Hijacking Attack Against Machine Learning Models. CoRR abs/2111.04394 (2021) - [i100]Cristian-Alexandru Staicu, Sazzadur Rahaman, Ágnes Kiss, Michael Backes:
Bilingual Problems: Studying the Security Risks Incurred by Native Extensions in Scripting Languages. CoRR abs/2111.11169 (2021) - 2020
- [j29]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [c212]Ilkan Esiyok, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes:
TrollThrottle - Raising the Cost of Astroturfing. ACNS (2) 2020: 456-476 - [c211]Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies. ACSAC 2020: 263-276 - [c210]Sebastian Roth, Michael Backes, Ben Stock:
Assessing the Impact of Script Gadgets on CSP at Scale. AsiaCCS 2020: 420-431 - [c209]Inken Hagestedt, Michael Backes, Andreas Bulling
:
Adversarial Attacks on Classifiers for Eye-based User Modelling. ETRA Adjunct 2020: 44:1-44:3 - [c208]Inken Hagestedt, Mathias Humbert, Pascal Berrang, Irina Lehmann, Roland Eils, Michael Backes, Yang Zhang:
Membership Inference Against DNA Methylation Databases. EuroS&P 2020: 509-520 - [c207]Kathrin Grosse, Thomas Alexander Trost, Marius Mosbach, Michael Backes, Dietrich Klakow:
On the Security Relevance of Initial Weights in Deep Neural Networks. ICANN (1) 2020: 3-14 - [c206]Kathrin Grosse, Michael T. Smith, Michael Backes:
Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks. ICPR 2020: 4696-4703 - [c205]Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan
, Jilles Vreeken, Michael Backes:
Towards Plausible Graph Anonymization. NDSS 2020 - [c204]Sanam Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, Sven Bugiel:
Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication. IEEE Symposium on Security and Privacy 2020: 268-285 - [c203]Stefano Calzavara, Sebastian Roth, Alvise Rabitti, Michael Backes, Ben Stock:
A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking Protection on the Web. USENIX Security Symposium 2020: 683-697 - [c202]Ahmed Salem, Apratim Bhattacharya, Michael Backes, Mario Fritz, Yang Zhang:
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. USENIX Security Symposium 2020: 1291-1308 - [i99]Tahleen A. Rahman, Mario Fritz, Michael Backes, Yang Zhang:
Everything About You: A Multimodal Approach towards Friendship Inference in Online Social Networks. CoRR abs/2003.00996 (2020) - [i98]Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang:
Dynamic Backdoor Attacks Against Machine Learning Models. CoRR abs/2003.03675 (2020) - [i97]Ilkan Esiyok, Lucjan Hanzlik, Robert Künnemann, Lena Marie Budde, Michael Backes:
Trollthrottle - Raising the Cost of Astroturfing. CoRR abs/2004.08836 (2020) - [i96]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. CoRR abs/2005.02131 (2020) - [i95]Min Chen
, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang:
When Machine Unlearning Jeopardizes Privacy. CoRR abs/2005.02205 (2020) - [i94]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i93]Inken Hagestedt, Michael Backes, Andreas Bulling:
Adversarial Attacks on Classifiers for Eye-based User Modelling. CoRR abs/2006.00860 (2020) - [i92]Xiaoyi Chen, Ahmed Salem, Michael Backes, Shiqing Ma, Yang Zhang:
BadNL: Backdoor Attacks Against NLP Models. CoRR abs/2006.01043 (2020) - [i91]Kathrin Grosse, Taesung Lee, Youngja Park, Michael Backes, Ian M. Molloy:
A new measure for overfitting and its implications for backdooring of deep learning. CoRR abs/2006.06721 (2020) - [i90]Kathrin Grosse, Michael Backes:
How many winning tickets are there in one DNN? CoRR abs/2006.07014 (2020) - [i89]Nico Döttling, Kathrin Grosse, Michael Backes, Ian M. Molloy:
Adversarial Examples and Metrics. CoRR abs/2007.06993 (2020) - [i88]Yang Zou, Zhikun Zhang, Michael Backes, Yang Zhang:
Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning. CoRR abs/2009.04872 (2020) - [i87]Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang:
BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models. CoRR abs/2010.03007 (2020) - [i86]Ahmed Salem, Michael Backes, Yang Zhang:
Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks. CoRR abs/2010.03282 (2020) - [i85]Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, Yang Zhang:
PrivSyn: Differentially Private Data Synthesis. CoRR abs/2012.15128 (2020)
2010 – 2019
- 2019
- [j28]Ahmed Salem, Pascal Berrang, Mathias Humbert, Michael Backes:
Privacy-Preserving Similar Patient Queries for Combined Biomedical Data. Proc. Priv. Enhancing Technol. 2019(1): 47-67 (2019) - [c201]Aurore Fass, Michael Backes, Ben Stock:
JStap: a static pre-filter for malicious JavaScript detection. ACSAC 2019: 257-269 - [c200]Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, Neil Zhenqiang Gong:
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. CCS 2019: 259-274 - [c199]Aurore Fass, Michael Backes, Ben Stock:
HideNoSeek: Camouflaging Malicious JavaScript in Benign ASTs. CCS 2019: 1899-1913 - [c198]Michael Backes, Lucjan Hanzlik, Jonas Schneider-Bensch:
Membership Privacy for Fully Dynamic Group Signatures. CCS 2019: 2181-2198 - [c197]Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to Wrap it up - A Formally Verified Proposal for the use of Authenticated Wrapping in PKCS#11. CSF 2019: 62-77 - [c196]Robert Künnemann, Ilkan Esiyok, Michael Backes:
Automated Verification of Accountability in Security Protocols. CSF 2019: 397-413 - [c195]Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. EUROCRYPT (3) 2019: 281-311 - [c194]Jie Huang, Nataniel P. Borges Jr.
, Sven Bugiel, Michael Backes:
Up-To-Crash: Evaluating Third-Party Library Updatability on Android. EuroS&P 2019: 15-30 - [c193]Tahleen A. Rahman, Bartlomiej Surma, Michael Backes, Yang Zhang:
Fairwalk: Towards Fair Graph Embedding. IJCAI 2019: 3289-3295 - [c192]Inken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, XiaoFeng Wang, Michael Backes:
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. NDSS 2019 - [c191]Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes:
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. NDSS 2019 - [c190]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Public Key Cryptography (1) 2019: 286-313 - [c189]Patrick Speicher, Marcel Steinmetz, Jörg Hoffmann, Michael Backes, Robert Künnemann:
Towards automated network mitigation analysis. SAC 2019: 1971-1978 - [c188]Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh:
Fidelius: Protecting User Secrets from Compromised Browsers. IEEE Symposium on Security and Privacy 2019: 264-280 - [c187]Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy. IEEE Symposium on Security and Privacy 2019: 555-569 - [c186]Robert Künnemann, Deepak Garg, Michael Backes:
Causality & Control Flow. CREST@ETAPS 2019: 32-46 - [i84]Kathrin Grosse, Thomas Alexander Trost, Marius Mosbach, Michael Backes, Dietrich Klakow:
Adversarial Initialization - when your network performs the way I want. CoRR abs/1902.03020 (2019) - [i83]Ahmed Salem, Apratim Bhattacharyya, Michael Backes, Mario Fritz, Yang Zhang:
Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning. CoRR abs/1904.01067 (2019) - [i82]Marie-Therese Walter, David Pfaff, Stefan Nürnberger, Michael Backes:
Proconda - Protected Control Data. CoRR abs/1909.03758 (2019) - [i81]Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A. Álvarez:
Adversarial Vulnerability Bounds for Gaussian Process Classification. CoRR abs/1909.08864 (2019) - [i80]Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, Neil Zhenqiang Gong:
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. CoRR abs/1909.10594 (2019) - [i79]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. IACR Cryptol. ePrint Arch. 2019: 63 (2019) - [i78]Michael Backes, Nico Döttling, Lucjan Hanzlik, Kamil Kluczniak, Jonas Schneider:
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions. IACR Cryptol. ePrint Arch. 2019: 196 (2019) - [i77]Alexander Dax, Robert Künnemann, Sven Tangermann, Michael Backes:
How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11. IACR Cryptol. ePrint Arch. 2019: 462 (2019) - 2018
- [j27]