Publications

(2025). Rerouting LLM Routers. preprint.

PDF Cite

(2025). Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents. USENIX Security Symposium 2025.

PDF Cite

(2024). Beyond Labeling Oracles: What does it mean to steal ML models?. TMLR 2024.

PDF Cite

(2024). Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods. Advances in Cryptology - CRYPTO, 2024.

PDF Cite

(2021). Membership inference attacks are easier on difficult problems. ICCV 2021.

PDF Cite

(2021). Crypto-Oriented Neural Architecture Design. ICASSP 2021.

PDF Cite