Michael Reiter

James B. Duke Distinguished Professor

Michael Reiter is a James B. Duke Distinguished Professor of Computer Science and Electrical & Computer Engineering at Duke University.  His previous positions include Director of Secure Systems Research at Bell Labs; Professor of Electrical & Computer Engineering and Computer Science at Carnegie Mellon University, where he was the founding Technical Director of CyLab; and Distinguished Professor of Computer Science at the University of North Carolina at Chapel Hill.

Appointments and Affiliations

  • James B. Duke Distinguished Professor
  • Professor of Computer Science
  • Professor of Electrical and Computer Engineering

Contact Information

  • Office Location: 308 Research Drive D310, Box 90129, Durham, NC 27708
  • Office Phone: (919) 660-6524
  • Email Address: michael.reiter@duke.edu
  • Websites:

Education

  • Ph.D. Cornell University, 1993

Research Interests

Prof. Reiter's research interests include all areas of computer and communications security, fault-tolerant distributed computing, and applied cryptography.

Awards, Honors, and Distinctions

  • Outstanding Contributions Award. ACM Special Interest Group on Security, Audit and Control (SIGSAC). 2016
  • Fellow. IEEE. 2014
  • Fellow. ACM. 2008

Courses Taught

  • COMPSCI 351: Computer Security
  • COMPSCI 581: Computer Security
  • COMPSCI 582: Cryptography
  • COMPSCI 590: Advanced Topics in Computer Science
  • ECE 590: Advanced Topics in Electrical and Computer Engineering
  • ECE 656: Cryptography

In the News

Representative Publications

  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
  • Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
  • Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
  • Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
  • Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
  • Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.