If you made any changes in Pure these will be visible here soon.

Research Output

2020

AIQL: Enabling efficient attack investigation from system monitoring data

Gao, P., Xiao, X., Li, Z., Jee, K., Xu, F., Kulkarni, S. R. & Mittal, P., Jan 1 2020, Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018. USENIX Association, p. 113-125 13 p. (Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Partial Recovery of ErdÅ's-Rényi Graph Alignment via k-Core Alignment

Cullina, D., Kiyavash, N., Mittal, P. & Poor, H. V., Jun 8 2020, SIGMETRICS Performance 2020 - Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems. Association for Computing Machinery, Inc, p. 99-100 2 p. (SIGMETRICS Performance 2020 - Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Partial Recovery of ErdÅ's-Rényi Graph Alignment via k-Core Alignment

Cullina, D., Kiyavash, N., Mittal, P. & Poor, H. V., Jul 8 2020, In : Performance Evaluation Review. 48, 1, p. 99-100 2 p.

Princeton University

Research output: Contribution to journalArticle

Querying streaming system monitoring data for enterprise system anomaly detection

Gao, P., Xiao, X., Li, D., Jee, K., Chen, H., Kulkarni, S. R. & Mittal, P., Apr 2020, Proceedings - 2020 IEEE 36th International Conference on Data Engineering, ICDE 2020. IEEE Computer Society, p. 1774-1777 4 p. 9101898. (Proceedings - International Conference on Data Engineering; vol. 2020-April).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Accelerated secure key distribution based on localized and asymmetric fiber interferometers

Huang, C., Ma, P. Y., Blow, E. C., Mittal, P. & Prucnal, P. R., Jan 1 2019, In : Optics Express. 27, 22, p. 32096-32110 15 p.

Princeton University

Research output: Contribution to journalArticle

Analyzing federated learning through an adversarial lens

Bhagoji, A. N., Chakraborty, S., Mittal, P. & Calo, S., Jan 1 2019, 36th International Conference on Machine Learning, ICML 2019. International Machine Learning Society (IMLS), p. 1012-1021 10 p. (36th International Conference on Machine Learning, ICML 2019; vol. 2019-June).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Analyzing the robustness of open-world machine learning

Sehwag, V., Sitawarin, C., Bhagoji, A. N., Cullina, D., Mittal, P., Song, L. & Chiang, M., Nov 11 2019, AISec 2019 - Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security. Association for Computing Machinery, p. 105-116 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

De-SAG: On the De-Anonymization of Structure-Attribute Graph Data

Ji, S., Wang, T., Chen, J., Li, W., Mittal, P. & Beyah, R., Jul 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 4, p. 594-607 14 p., 7938634.

Princeton University

Research output: Contribution to journalArticle

3 Scopus citations

Learning Informative and Private Representations via Generative Adversarial Networks

Yang, T. Y., Brinton, C., Mittal, P., Chiang, M. & Lan, A., Jan 22 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1534-1543 10 p. 8622089. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Line failure detection after a cyber-physical attack on the grid using bayesian regression

Soltan, S., Mittal, P. & Poor, H. V., Sep 2019, In : IEEE Transactions on Power Systems. 34, 5, p. 3758-3768 11 p., 8686241.

Princeton University

Research output: Contribution to journalArticle

Membership inference attacks against adversarially robust deep learning models

Song, L., Shokri, R. & Mittal, P., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019. Institute of Electrical and Electronics Engineers Inc., p. 50-56 7 p. 8844607. (Proceedings - 2019 IEEE Symposium on Security and Privacy Workshops, SPW 2019).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Privacy risks of securing machine learning models against adversarial examples

Song, L., Shokri, R. & Mittal, P., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 241-257 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations

Robustness of Optical Steganographic Communication Under Coherent Detection Attack

Huang, C., Ma, P. Y., Shastri, B. J., Mittal, P. & Prucnal, P. R., Feb 15 2019, In : IEEE Photonics Technology Letters. 31, 4, p. 327-330 4 p., 8607988.

Princeton University

Research output: Contribution to journalArticle

4 Scopus citations

Robust website fingerprinting through the cache occupancy channel

Shusterman, A., Kang, L., Haskal, Y., Meltser, Y., Mittal, P., Oren, Y. & Yarom, Y., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 28th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

SICO: Surgical interception attacks by manipulating BGP communities

Birge-Lee, H., Wang, L., Rexford, J. & Mittal, P., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 431-448 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
1 Scopus citations

Vaccine: Using contextual integrity for data leakage detection

Shvartzshnaider, Y., Wies, T., Pavlinovic, Z., Lakshminarayanan, Mittal, P., Balashankar, A. & Nissenbaum, H., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 1702-1712 11 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Watching you watch: The tracking ecosystem of over-the-top TV streaming devices

Moghaddam, H. M., Acar, G., Burgess, B., Mathur, A., Huang, D. Y., Feamster, N. G., Felten, E. W., Mittal, P. & Narayanan, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-147 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2 Scopus citations
2018

Acoustic denial of service attacks on hard disk drives

Shahrad, M., Mosenia, A., Song, L., Chiang, M., Wentzlaff, D. & Mittal, P., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 34-39 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Adaptive fog-based output security for augmented reality

Ahn, S., Gorlatova, M., Naghizadeh, P., Chiang, M. & Mittal, P., Aug 7 2018, VR/AR Network 2018 - Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2018. Association for Computing Machinery, Inc, p. 1-6 6 p. (VR/AR Network 2018 - Proceedings of the 2018 Morning Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

A Query system for efficiently investigating complex attack behaviors for enterprise security

Gao, P., Xiao, X., Li, Z., Jee, K., Xu, F., Kulkarni, S. R. & Mittal, P., Jan 1 2018, In : Proceedings of the VLDB Endowment. 12, 12, p. 1802-1805 4 p.

Princeton University

Research output: Contribution to journalConference article

Automatically generating a large, culture-specific blocklist for China

Mittal, P., Hounsel, A. & Feamster, N., Jan 1 2018.

Princeton University

Research output: Contribution to conferencePaper

Bamboozling certificate authorities with BGP

Birge-Lee, H., Sun, Y., Edmundson, A., Rexford, J. & Mittal, P., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 833-849 17 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Bayesian Regression for Robust Power Grid State Estimation Following a Cyber-Physical Attack

Soltan, S., Mittal, P. & Poor, H. V., Dec 21 2018, 2018 IEEE Power and Energy Society General Meeting, PESGM 2018. IEEE Computer Society, 8586142. (IEEE Power and Energy Society General Meeting; vol. 2018-August).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

BlackIoT: IoT botnet of high wattage devices can disrupt the power grid

Soltan, S., Mittal, P. & Poor, H. V., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 15-32 18 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

44 Scopus citations

Blind source separation in the physical layer

Tait, A. N., De Lima, T. F., Ma, P. Y., Chang, M. P., Nahmias, M. A., Shastri, B. J., Mittal, P. & Prucnal, P. R., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Enhancing robustness of machine learning systems via data transformations

Bhagoji, A. N., Cullina, D., Sitawarin, C. & Mittal, P., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Fundamental Limits of Database Alignment

Cullina, D., Mittal, P. & Kiyavash, N., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., p. 651-655 5 p. 8437908. (IEEE International Symposium on Information Theory - Proceedings; vol. 2018-June).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

How to quantify graph De-anonymization risks

Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R. B., Jan 1 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Camp, O. & Furnell, S. (eds.). Springer Verlag, p. 84-104 21 p. (Communications in Computer and Information Science; vol. 867).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

MVG mechanism: Differential privacy under matrix-valued query

Chanyaswad, T., Dytso, A., Poor, H. V. & Mittal, P., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 230-246 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

PAC-learning in the presence of evasion adversaries

Cullina, D., Bhagoji, A. N. & Mittal, P., 2018, In : Advances in Neural Information Processing Systems. 2018-December, p. 230-241 12 p.

Princeton University

Research output: Contribution to journalConference article

2 Scopus citations

PinMe: Tracking a smartphone user around the world

Mosenia, A., Dai, X., Mittal, P. & Jha, N. K., Jul 1 2018, In : IEEE Transactions on Multi-Scale Computing Systems. 4, 3, p. 420-435 16 p., 8038870.

Princeton University

Research output: Contribution to journalArticle

11 Scopus citations

SAQL: A stream-based query system for real-time abnormal system behavior detection

Gao, P., Xiao, X., Li, D., Li, Z., Jee, K., Wu, Z., Kim, C. H., Kulkarni, S. R. & Mittal, P., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 27th USENIX Security Symposium).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Steganographic communication via spread optical noise: A link-level eavesdropping resilient system

Ma, P. Y., Wu, B., Shastri, B. J., Tait, A. N., Mittal, P. & Prucnal, P. R., Dec 1 2018, In : Journal of Lightwave Technology. 36, 23, p. 5344-5357 14 p., 8474354.

Rowan University, Princeton University

Research output: Contribution to journalArticle

2 Scopus citations

SYBILFUSE: Combining local attributes with global structure to perform robust sybil detection

Gao, P., Wang, B., Gong, N. Z., Kulkarni, S. R., Thomas, K. & Mittal, P., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433147. (2018 IEEE Conference on Communications and Network Security, CNS 2018).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2017

Blind De-anonymization Attacks using Social Networks

Lee, W. H., Ji, S., Liu, C., Mittal, P. & Lee, R. B., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 1-4 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks

Zhou, Y., Wagh, S., Mittal, P. & Wentzlaff, D., May 5 2017, Proceedings - 2017 IEEE 23rd Symposium on High Performance Computer Architecture, HPCA 2017. IEEE Computer Society, p. 337-348 12 p. 7920837. (Proceedings - International Symposium on High-Performance Computer Architecture).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks

Sun, Y., Edmundson, A., Feamster, N., Chiang, M. & Mittal, P., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 977-992 16 p. 7958620. (Proceedings - IEEE Symposium on Security and Privacy).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey

Ji, S., Mittal, P. & Beyah, R., Apr 1 2017, In : IEEE Communications Surveys and Tutorials. 19, 2, p. 1305-1326 22 p., 7762777.

Princeton University

Research output: Contribution to journalReview article

28 Scopus citations

InFlo: A novel systems biology framework identifies cAMP-CREB1 axis as a key modulator of platinum resistance in ovarian cancer

Dimitrova, N., Nagaraj, A. B., Razi, A., Singh, S., Kamalakaran, S., Banerjee, N., Joseph, P., Mankovich, A., Mittal, P., Difeo, A. & Varadan, V., Apr 27 2017, In : Oncogene. 36, 17, p. 2472-2482 11 p.

Princeton University

Research output: Contribution to journalArticle

9 Scopus citations

Poster: Inaudible voice commands

Song, L. & Mittal, P., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2583-2585 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Quantification of de-anonymization risks in social networks

Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R., Jan 1 2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, p. 126-135 10 p. (ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Liu, Z., Liu, Y., Winter, P., Mittal, P. & Hu, Y. C., Nov 21 2017, 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 8117564. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2017-October).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Tracking a Smartphone User Around the World

Mosenia, A., Dai, X., Mittal, P. & Jha, N., Jul 24 2017

Princeton University

Research output: Innovation

Using EEG-based BCI devices to subliminally probe for private information

Frank, M., Hwu, T., Jain, S., Knight, R. T., Martinovic, I., Mittal, P., Perito, D., Sluganovic, I. & Song, D., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 133-136 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2016

Discriminant-component eigenfaces for privacy-preserving face recognition

Chanyaswad, T., Chang, J. M., Mittal, P. & Kung, S. Y., Nov 8 2016, 2016 IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2016 - Proceedings. Diamantaras, K., Uncini, A., Palmieri, F. A. N. & Larsen, J. (eds.). IEEE Computer Society, 7738871. (IEEE International Workshop on Machine Learning for Signal Processing, MLSP; vol. 2016-November).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

On the relative de-anonymizability of graph data: Quantification and evaluation

Ji, S., Li, W., Yang, S., Mittal, P. & Beyah, R., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524585

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Root ORAM: A Tunable Differentially Private Oblivious RAM

Wagh, S., Cuff, P. & Mittal, P., Oct 24 2016

Princeton University

Research output: Innovation

Seed-Based De-Anonymizability Quantification of Social Networks

Ji, S., Li, W., Gong, N. Z., Mittal, P. & Beyah, R., Jul 1 2016, In : IEEE Transactions on Information Forensics and Security. 11, 7, p. 1398-1411 14 p., 7405301.

Princeton University

Research output: Contribution to journalArticle

18 Scopus citations

SmartWalk: Enhancing social network security via adaptive random walks

Liu, Y., Ji, S. & Mittal, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 492-503 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations
2015

Exploiting temporal dynamics in Sybil defenses

Liu, C., Gao, P., Wright, M. & Mittal, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 805-816 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations