
James B. Duke Distinguished Professor
Michael Reiter is a James B. Duke Distinguished Professor of Computer Science and Electrical & Computer Engineering at Duke University. His previous positions include Director of Secure Systems Research at Bell Labs; Professor of Electrical & Computer Engineering and Computer Science at Carnegie Mellon University, where he was the founding Technical Director of CyLab; and Distinguished Professor of Computer Science at the University of North Carolina at Chapel Hill.
Appointments and Affiliations
- James B. Duke Distinguished Professor
- Professor of Computer Science
- Professor of Electrical and Computer Engineering
Contact Information
- Office Location: 308 Research Drive D310, Box 90129, Durham, NC 27708
- Office Phone: (919) 660-6524
- Email Address: michael.reiter@duke.edu
- Websites:
Education
- Ph.D. Cornell University, 1993
Research Interests
Prof. Reiter's research interests include all areas of computer and communications security, fault-tolerant distributed computing, and applied cryptography.
Awards, Honors, and Distinctions
- Outstanding Contributions Award. ACM Special Interest Group on Security, Audit and Control (SIGSAC). 2016
- Fellow. IEEE. 2014
- Fellow. ACM. 2008
Courses Taught
- COMPSCI 351: Computer Security
- COMPSCI 581: Computer Security
- COMPSCI 582: Cryptography
- COMPSCI 590: Advanced Topics in Computer Science
- ECE 590: Advanced Topics in Electrical and Computer Engineering
- ECE 656: Cryptography
In the News
- The Growing Role of Computation in Science (Feb 9, 2022 | Duke Research Blog)
- Duke Awards 22 Distinguished Professorships (Jun 28, 2021)
Representative Publications
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.
- Wang, Ke Coby, and Michael K. Reiter. “Bernoulli honeywords,” December 24, 2022.
- Wang, W., S. Deng, J. Niu, M. K. Reiter, and Y. Zhang. “ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.” In Proceedings of the Acm Conference on Computer and Communications Security, 2841–55, 2022. https://doi.org/10.1145/3548606.3560639.
- Zhang, X., J. Hamm, M. K. Reiter, and Y. Zhang. “Defeating traffic analysis via differential privacy: a case study on streaming traffic.” International Journal of Information Security 21, no. 3 (June 1, 2022): 689–706. https://doi.org/10.1007/s10207-021-00574-3.
- Chakraborti, Anrin, Giulia Fanti, and Michael K. Reiter. “Distance-Aware Private Set Intersection,” December 29, 2021.
- Lin, Weiran, Keane Lucas, Lujo Bauer, Michael K. Reiter, and Mahmood Sharif. “Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks,” December 28, 2021.