Teodora Baluta
Teodora Baluta
Verified email at - Homepage
Cited by
Cited by
Quantitative verification of neural networks and its security applications
T Baluta, S Shen, S Shinde, KS Meel, P Saxena
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics.
ZL Chua, Y Wang, T Baluta, P Saxena, Z Liang, P Su
NDSS, 2019
Scalable quantitative verification for deep neural networks
T Baluta, ZL Chua, KS Meel, P Saxena
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
Modeling the effects of insider threats on cybersecurity of complex systems
T Baluta, L Ramapantulu, YM Teo, EC Chang
2017 Winter Simulation Conference (WSC), 4360-4371, 2017
Private Hierarchical Clustering in Federated Networks
A Kolluri, T Baluta, P Saxena
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Membership Inference Attacks and Generalization: A Causal Perspective
T Baluta, S Shen, S Hitarth, S Tople, P Saxena
arXiv preprint arXiv:2209.08615, 2022
User-customizable Transpilation of Scripting Languages
B Wang, A Kullori, I Nikolić, T Baluta, P Saxena
arXiv preprint arXiv:2301.11220, 2023
LPGNet: Link Private Graph Networks for Node Classification
A Kolluri, T Baluta, B Hooi, P Saxena
arXiv preprint arXiv:2205.03105, 2022
SynGuar: guaranteeing generalization in programming by example
B Wang, T Baluta, A Kolluri, P Saxena
Proceedings of the 29th ACM Joint Meeting on European Software Engineering …, 2021
The system can't perform the operation now. Try again later.
Articles 1–9