Follow
Octavian Suciu
Octavian Suciu
Verified email at umd.edu - Homepage
Title
Cited by
Cited by
Year
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
A Shafahi, WR Huang, M Najibi, O Suciu, C Studer, T Dumitras, ...
Advances in Neural Information Processing Systems 31 (NeurIPS 2018), 2018
10482018
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits
C Sabottke, O Suciu, T Dumitraș
24th USENIX Security Symposium (USENIX Security 15), 1041-1056, 2015
3742015
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
O Suciu, R Marginean, Y Kaya, H Daume III, T Dumitras
27th USENIX Security Symposium (USENIX Security 18), 1299-1316, 2018
2982018
Exploring Adversarial Examples in Malware Detection
O Suciu, SE Coull, J Johns
2019 IEEE Security and Privacy Workshops (SPW), 8-14, 2019
2082019
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits
O Suciu, C Nelson, Z Lyu, T Bao, T Dumitraș
31st USENIX Security Symposium (USENIX Security 22), 377-394, 2022
332022
Summoning demons: The pursuit of exploitable bugs in machine learning
R Stevens, O Suciu, A Ruef, S Hong, M Hicks, T Dumitraş
arXiv preprint arXiv:1701.04739, 2017
212017
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights
J Jacobs, S Romanosky, O Suciu, B Edwards, A Sarabi
arXiv preprint arXiv:2302.14172, 2023
82023
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
O Suciu, R Mărginean, Y Kaya, H Daumé III, T Dumitraş
arXiv preprint arXiv:1803.06975, 2018
22018
Data-Driven Techniques for Vulnerability Assessments
OP Suciu
University of Maryland, College Park, 2021
12021
Systems and methods for predicting development of functional vulnerability exploits
T Bao, C Nelson, Z Lyu, T Dumitras, O Suciu
US Patent App. 18/169,674, 2023
2023
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System
T Dumitraş, Y Kaya, R Mărginean, O Suciu
Security Protocols XXVI: 26th International Workshop, 150-162, 2018
2018
Poster: Exploring Adversarial Examples in Malware Detection
O Suciu, SE Coull, J Johns
The system can't perform the operation now. Try again later.
Articles 1–12