Name
Affiliation
Papers
MATT FREDRIKSON
University of Wisconsin,
46
Collaborators
Citations 
PageRank 
96
972
48.56
Referers 
Referees 
References 
2807
981
482
Search Limit
1001000
Title
Citations
PageRank
Year
Consistent Counterfactuals for Deep Models00.342022
Exploring Conceptual Soundness with TruLens.00.342021
Globally-Robust Neural Networks00.342021
Netter - Probabilistic, Stateful Network Models.00.342021
Machine Learning Explainability and Robustness: Connected at the Hip00.342021
Fast Geometric Projections for Local Robustness Certification00.342021
Automating Audit with Policy Inference00.342021
Smoothed Geometry for Robust Attribution00.342020
Contextual and Granular Policy Enforcement in Database-backed Applications00.342020
Individual Fairness Revisited: Transferring Techniques from Adversarial Robustness00.342020
Reconciling noninterference and gradual typing00.342020
Interpreting Interpretations: Organizing Attribution Methods by Criteria00.342020
Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning.00.342020
Influence Paths for Characterizing Subject-Verb Number Agreement in LSTM Language Models00.342020
FlipTest: Fairness Auditing via Optimal Transport.00.342019
Quantitative underpinnings of secure, graceful degradation: poster.00.342018
Verifying and Synthesizing Constant-Resource Implementations with Types40.402018
Hunting for Discriminatory Proxies in Linear Regression Models.00.342018
Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps.20.362018
ESTRELA: Automated Policy Enforcement Across Remote APIs.00.342018
Supervising Feature Influence.00.342018
Feature-Wise Bias Amplification.00.342018
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting230.702018
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs.60.452017
Proxy Non-Discrimination in Data-Driven Systems.40.472017
PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps.20.362017
The Unintended Consequences of Overfitting: Training Data Inference Attacks.10.352017
PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage.10.352017
A Methodology for Formalizing Model-Inversion Attacks80.492016
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures1564.802015
Surreptitiously Weakening Cryptographic Systems.00.342015
Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences.00.342015
The Limitations of Deep Learning in Adversarial Settings39116.692015
ZØ: an optimizing distributing zero-knowledge compiler50.392014
Satisfiability modulo counting: a new approach for analyzing privacy properties90.452014
On the practical exploitability of dual EC in TLS implementations50.822014
Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing722.102014
MoRePriv: mobile OS support for application personalization and privacy.120.612014
Efficient runtime policy enforcement using counterexample-guided abstraction refinement60.532012
Dynamic behavior matching: a complexity analysis and new approximation algorithms60.452011
RePriv: Re-imagining Content Personalization and In-browser Privacy361.382011
Verified Security for Browser Extensions472.552011
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors902.802010
Automatic generation of remediation procedures for malware infections100.562010
Mining graph patterns efficiently via randomized summaries291.062009
A Layered Architecture for Detecting Malicious Behaviors472.012008