Ana-Maria Cretu
Ana-Maria Cretu
Verified email at - Homepage
Cited by
Cited by
A Surprisingly Robust Trick for Winograd Schema Challenge
V Kocijan, AM Cretu, OM Camburu, Y Yordanov, T Lukasiewicz
arXiv preprint arXiv:1905.06290, 2019
WikiCREM: A Large Unsupervised Corpus for Coreference Resolution
V Kocijan, OM Camburu, AM Cretu, Y Yordanov, P Blunsom, ...
arXiv preprint arXiv:1908.08025, 2019
Interaction data are identifiable even across long periods of time
AM Creţu, F Monti, S Marrone, X Dong, M Bronstein, YA de Montjoye
Nature Communications 13 (1), 313, 2022
Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning
S Jain*, AM Crețu*, YA de Montjoye
31st USENIX Security Symposium (USENIX Security 22), 2317-2334, 2022
Achilles' Heels: Vulnerable Record Identification in Synthetic Data Publishing
M Meeus, F Guepin, AM Cretu, YA de Montjoye
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting
AM Cretu, D Jones, YA de Montjoye, S Tople
Proceedings on Privacy Enhancing Technologies (PoPETs 2024), 2024
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems
AM Cretu, F Houssiau, A Cully, YA de Montjoye
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition
S Jain, AM Cretu, A Cully, YA de Montjoye
2023 IEEE Symposium on Security and Privacy (SP), 234-252, 2023
Synthetic is all you need: removing the auxiliary data assumption for membership inference attacks against synthetic data
F Guépin, M Meeus, AM Creţu, YA de Montjoye
European Symposium on Research in Computer Security, 182-198, 2023
Correlation inference attacks against machine learning models
AM Creţu, F Guépin, YA de Montjoye
arXiv preprint arXiv:2112.08806, 2021
Blogpost: Deep perceptual hashing is not robust to adversarial detection avoidance attacks
A Wong, S Jain, AM Cretu, YA de Montjoye
Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks
AM Cretu, M Rusu, YA de Montjoye
The 14th ACM Conference on Data and Application Security and Privacy …, 2024
The system can't perform the operation now. Try again later.
Articles 1–12