publications

  • On the Security of Randomized Defenses Against Adversarial Samples
    Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, and Ghassan Karame
    ACM ASIA Conference on Computer and Communications Security (ASIACCS), 2020
    [pdf]

  • Optimizing the Sequence of Vulnerability Scanning Injections (Poster)
    Koichi Funaya, Samir Bajaj, Kumar Sharad, and Alok Srivastava
    IEEE Conference on Dependable and Secure Computing (DSC), 2018
    [pdf]

  • Transcend: Detecting Concept Drift in Malware Classification Models
    Roberto Jordaney, Kumar Sharad, Santanu Kumar Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro
    USENIX Security Symposium (USENIX Sec), 2017
    [pdf] [slides]

  • Change of Guard: The Next Generation of Social Graph De-anonymization Attacks
    Kumar Sharad
    Workshop on Artificial Intelligence and Security (AISec), 2016
    [pdf] [slides]

  • True Friends Let You Down: Benchmarking Social Graph Anonymization Schemes
    Kumar Sharad
    Workshop on Artificial Intelligence and Security (AISec), 2016
    [pdf] [slides]

  • Misleading Metrics: On Evaluating Machine Learning for Malware with Confidence (Poster)
    Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, Kumar Sharad, and Lorenzo Cavallaro
    IEEE Symposium on Security and Privacy (IEEE S&P), 2016
    [abstract] [poster]

  • An Automated Social Graph De-anonymization Technique
    Kumar Sharad and George Danezis
    Workshop on Privacy in the Electronic Society (WPES), 2014
    [pdf] [slides]

  • De-anonymizing D4D Datasets
    Kumar Sharad and George Danezis
    Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2013
    [pdf] [slides]

  • Privacy Leak in Egonets (Poster)
    Kumar Sharad and George Danezis
    Computer Laboratory 75th Anniversary, 2013
    [poster]