Bad Characters: Imperceptible NLP Attacks N Boucher, I Shumailov, R Anderson, N Papernot 2022 IEEE Symposium on Security and Privacy (S&P), 2022 | 110 | 2022 |
Trojan Source: Invisible Vulnerabilities N Boucher, R Anderson 2023 USENIX Security Symposium, 2023 | 19 | 2023 |
Threat models over space and time: a case study of E2EE messaging applications PD Chowdhury, M Sameen, J Blessing, N Boucher, J Gardiner, T Burrows, ... arXiv preprint arXiv:2301.05653, 2023 | 4 | 2023 |
Boosting big brother: Attacking search engines with encodings N Boucher, L Pajola, I Shumailov, R Anderson, M Conti Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 3 | 2023 |
Talking Trojan: Analyzing an Industry-Wide Disclosure N Boucher, R Anderson 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem …, 2022 | 3 | 2022 |
Automatic Bill of Materials N Boucher, R Anderson arXiv preprint arXiv:2310.09742, 2023 | 1 | 2023 |
When Vision Fails: Text Attacks Against ViT and OCR N Boucher, J Blessing, I Shumailov, R Anderson, N Papernot arXiv preprint arXiv:2306.07033, 2023 | 1 | 2023 |
Deception and defense from machine learning to supply chains N Boucher | | 2024 |
If It’s Provably Secure, It Probably Isn’t: Why Learning from Proof Failure is Hard (Transcript of Discussion) R Anderson, N Boucher Cambridge International Workshop on Security Protocols, 205-210, 2023 | | 2023 |
If It’s Provably Secure, It Probably Isn’t: Why Learning from Proof Failure Is Hard R Anderson, N Boucher Cambridge International Workshop on Security Protocols, 199-204, 2023 | | 2023 |