default search action
Yigitcan Kaya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Michael-Andrei Panaitescu-Liess, Yigitcan Kaya, Sicheng Zhu, Furong Huang, Tudor Dumitras:
Like Oil and Water: Group Robustness Methods and Poisoning Defenses May Be at Odds. ICLR 2024 - [c11]Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras:
DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness. ICLR 2024 - [c10]Kamala Varma, Arda Numanoglu, Yigitcan Kaya, Tudor Dumitras:
Understanding, Uncovering, and Mitigating the Causes of Inference Slowdown for Language Models. SaTML 2024: 723-740 - [i11]Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David A. Wagner, Tudor Dumitras:
Demystifying Behavior-Based Malware Detection at Endpoints. CoRR abs/2405.06124 (2024) - 2023
- [b1]Yigitcan Kaya:
The Limitations of Deep Learning Methods in Realistic Adversarial Settings. University of Maryland, College Park, MD, USA, 2023 - [i10]Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi:
Adversarial Robustness of Learning-based Static Malware Classifiers. CoRR abs/2303.13372 (2023) - 2022
- [c9]Yigitcan Kaya, Muhammad Bilal Zafar, Sergül Aydöre, Nathalie Rauschmayr, Krishnaram Kenthapadi:
Generating Distributional Adversarial Examples to Evade Statistical Detectors. ICML 2022: 10895-10911 - 2021
- [c8]Sanghyun Hong, Yigitcan Kaya, Ionut-Vlad Modoranu, Tudor Dumitras:
A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference. ICLR 2021 - [c7]Yigitcan Kaya, Tudor Dumitras:
When Does Data Augmentation Help With Membership Inference Attacks? ICML 2021: 5345-5355 - [c6]Sanghyun Hong, Michael-Andrei Panaitescu-Liess, Yigitcan Kaya, Tudor Dumitras:
Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes. NeurIPS 2021: 9303-9316 - [i9]Sanghyun Hong, Michael-Andrei Panaitescu-Liess, Yigitcan Kaya, Tudor Dumitras:
Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes. CoRR abs/2110.13541 (2021) - 2020
- [c5]Sanghyun Hong, Michael Davinroy, Yigitcan Kaya, Dana Dachman-Soled, Tudor Dumitras:
How to 0wn the NAS in Your Spare Time. ICLR 2020 - [i8]Sanghyun Hong, Michael Davinroy, Yigitcan Kaya, Dana Dachman-Soled, Tudor Dumitras:
How to 0wn NAS in Your Spare Time. CoRR abs/2002.06776 (2020) - [i7]Sanghyun Hong, Varun Chandrasekaran, Yigitcan Kaya, Tudor Dumitras, Nicolas Papernot:
On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping. CoRR abs/2002.11497 (2020) - [i6]Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras:
On the Effectiveness of Regularization Against Membership Inference Attacks. CoRR abs/2006.05336 (2020) - [i5]Sanghyun Hong, Yigitcan Kaya, Ionut-Vlad Modoranu, Tudor Dumitras:
A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference. CoRR abs/2010.02432 (2020)
2010 – 2019
- 2019
- [c4]Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras:
Shallow-Deep Networks: Understanding and Mitigating Network Overthinking. ICML 2019: 3301-3310 - [c3]Sanghyun Hong, Pietro Frigo, Yigitcan Kaya, Cristiano Giuffrida, Tudor Dumitras:
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks. USENIX Security Symposium 2019: 497-514 - [i4]Sanghyun Hong, Pietro Frigo, Yigitcan Kaya, Cristiano Giuffrida, Tudor Dumitras:
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks. CoRR abs/1906.01017 (2019) - 2018
- [c2]Tudor Dumitras, Yigitcan Kaya, Radu Marginean, Octavian Suciu:
Too Big to FAIL: What You Need to Know Before Attacking a Machine Learning System. Security Protocols Workshop 2018: 150-162 - [c1]Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daumé III, Tudor Dumitras:
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks. USENIX Security Symposium 2018: 1299-1316 - [i3]Octavian Suciu, Radu Marginean, Yigitcan Kaya, Hal Daumé III, Tudor Dumitras:
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks. CoRR abs/1803.06975 (2018) - [i2]Sanghyun Hong, Michael Davinroy, Yigitcan Kaya, Stuart Nevans Locke, Ian Rackow, Kevin Kulda, Dana Dachman-Soled, Tudor Dumitras:
Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks. CoRR abs/1810.03487 (2018) - [i1]Yigitcan Kaya, Tudor Dumitras:
How to Stop Off-the-Shelf Deep Neural Networks from Overthinking. CoRR abs/1810.07052 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint