default search action
Ilya Mironov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Karthik Prasad, Sayan Ghosh, Graham Cormode, Ilya Mironov, Ashkan Yousefpour, Pierre Stock:
Reconciling Security and Communication Efficiency in Federated Learning. IEEE Data Eng. Bull. 46(1): 67-78 (2023) - [j5]Meisam Hejazinia, Dzmitry Huba, Ilias Leontiadis, Kiwan Maeng, Mani Malek, Luca Melis, Ilya Mironov, Milad Nasr, Kaikai Wang, Carole-Jean Wu:
Federated Ensemble Learning: Increasing the Capacity of Label Private Recommendation Systems. IEEE Data Eng. Bull. 46(1): 145-157 (2023) - [i37]Ashkan Yousefpour, Shen Guo, Ashish Shenoy, Sayan Ghosh, Pierre Stock, Kiwan Maeng, Schalk-Willem Krüger, Michael G. Rabbat, Carole-Jean Wu, Ilya Mironov:
Green Federated Learning. CoRR abs/2303.14604 (2023) - 2022
- [i36]Pierre Stock, Igor Shilov, Ilya Mironov, Alexandre Sablayrolles:
Defending against Reconstruction Attacks with Rényi Differential Privacy. CoRR abs/2202.07623 (2022) - [i35]Meisam Hejazinia, Dzmitry Huba, Ilias Leontiadis, Kiwan Maeng, Mani Malek, Luca Melis, Ilya Mironov, Milad Nasr, Kaikai Wang, Carole-Jean Wu:
FEL: High Capacity Learning for Recommendation and Ranking via Federated Ensemble Learning. CoRR abs/2206.03852 (2022) - [i34]Karthik Prasad, Sayan Ghosh, Graham Cormode, Ilya Mironov, Ashkan Yousefpour, Pierre Stock:
Reconciling Security and Communication Efficiency in Federated Learning. CoRR abs/2207.12779 (2022) - 2021
- [c45]Mani Malek Esmaeili, Ilya Mironov, Karthik Prasad, Igor Shilov, Florian Tramèr:
Antipodes of Label Differential Privacy: PATE and ALIBI. NeurIPS 2021: 6934-6945 - [i33]Huanyu Zhang, Ilya Mironov, Meisam Hejazinia:
Wide Network Learning with Differential Privacy. CoRR abs/2103.01294 (2021) - [i32]Mani Malek, Ilya Mironov, Karthik Prasad, Igor Shilov, Florian Tramèr:
Antipodes of Label Differential Privacy: PATE and ALIBI. CoRR abs/2106.03408 (2021) - [i31]Ashkan Yousefpour, Igor Shilov, Alexandre Sablayrolles, Davide Testuggine, Karthik Prasad, Mani Malek, John Nguyen, Sayan Ghosh, Akash Bharadwaj, Jessica Zhao, Graham Cormode, Ilya Mironov:
Opacus: User-Friendly Differential Privacy Library in PyTorch. CoRR abs/2109.12298 (2021) - [i30]Sen Yuan, Milan Shen, Ilya Mironov, Anderson C. A. Nascimento:
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy. IACR Cryptol. ePrint Arch. 2021: 835 (2021) - 2020
- [c44]Nicholas Carlini, Matthew Jagielski, Ilya Mironov:
Cryptanalytic Extraction of Neural Network Models. CRYPTO (3) 2020: 189-218 - [i29]Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Shuang Song, Kunal Talwar, Abhradeep Thakurta:
Encode, Shuffle, Analyze Privacy Revisited: Formalizations and Empirical Evaluation. CoRR abs/2001.03618 (2020) - [i28]Nicholas Carlini, Matthew Jagielski, Ilya Mironov:
Cryptanalytic Extraction of Neural Network Models. CoRR abs/2003.04884 (2020)
2010 – 2019
- 2019
- [c43]Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Abhradeep Thakurta:
Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity. SODA 2019: 2468-2479 - [c42]Krishnaram Kenthapadi, Ilya Mironov, Abhradeep Guha Thakurta:
Privacy-preserving Data Mining in Industry. WSDM 2019: 840-841 - [c41]Krishnaram Kenthapadi, Ilya Mironov, Abhradeep Thakurta:
Privacy-preserving Data Mining in Industry. WWW (Companion Volume) 2019: 1308-1310 - [i27]Úlfar Erlingsson, Ilya Mironov, Ananth Raghunathan, Shuang Song:
That which we call private. CoRR abs/1908.03566 (2019) - [i26]Ilya Mironov, Kunal Talwar, Li Zhang:
Rényi Differential Privacy of the Sampled Gaussian Mechanism. CoRR abs/1908.10530 (2019) - 2018
- [j4]Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev:
Incremental Deterministic Public-Key Encryption. J. Cryptol. 31(1): 134-161 (2018) - [c40]Vitaly Feldman, Ilya Mironov, Kunal Talwar, Abhradeep Thakurta:
Privacy Amplification by Iteration. FOCS 2018: 521-532 - [c39]Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson:
Scalable Private Learning with PATE. ICLR 2018 - [i25]Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Úlfar Erlingsson:
Scalable Private Learning with PATE. CoRR abs/1802.08908 (2018) - [i24]Vitaly Feldman, Ilya Mironov, Kunal Talwar, Abhradeep Thakurta:
Privacy Amplification by Iteration. CoRR abs/1808.06651 (2018) - [i23]Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, Abhradeep Thakurta:
Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity. CoRR abs/1811.12469 (2018) - 2017
- [c38]Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. CSF 2017: 1-6 - [c37]Ilya Mironov:
Rényi Differential Privacy. CSF 2017: 263-275 - [c36]Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, Bernhard Seefeld:
Prochlo: Strong Privacy for Analytics in the Crowd. SOSP 2017: 441-459 - [c35]Ilya Mironov, Gil Segev, Ido Shahaf:
Strengthening the Security of Encrypted Databases: Non-transitive JOINs. TCC (2) 2017: 631-661 - [i22]Ilya Mironov:
Renyi Differential Privacy. CoRR abs/1702.07476 (2017) - [i21]Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches. CoRR abs/1708.08022 (2017) - [i20]Petros Maniatis, Ilya Mironov, Kunal Talwar:
Oblivious Stash Shuffle. CoRR abs/1709.07553 (2017) - [i19]Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnés, Bernhard Seefeld:
Prochlo: Strong Privacy for Analytics in the Crowd. CoRR abs/1710.00901 (2017) - [i18]Ilya Mironov, Gil Segev, Ido Shahaf:
Strengthening the Security of Encrypted Databases: Non-Transitive JOINs. IACR Cryptol. ePrint Arch. 2017: 883 (2017) - 2016
- [c34]Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang:
Deep Learning with Differential Privacy. CCS 2016: 308-318 - [c33]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE. CCS 2016: 1006-1018 - [c32]Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. CRYPTO (1) 2016: 341-372 - [c31]Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai:
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?. ICALP 2016: 29:1-29:15 - [i17]Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang:
Deep Learning with Differential Privacy. CoRR abs/1607.00133 (2016) - [i16]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE. IACR Cryptol. ePrint Arch. 2016: 659 (2016) - 2015
- [c30]Dan Boneh, Divya Gupta, Ilya Mironov, Amit Sahai:
Hosting Services on an Untrusted Cloud. EUROCRYPT (2) 2015: 404-436 - [c29]Ilya Mironov, Noah Stephens-Davidowitz:
Cryptographic Reverse Firewalls. EUROCRYPT (2) 2015: 657-686 - [i15]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. IACR Cryptol. ePrint Arch. 2015: 440 (2015) - [i14]Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. IACR Cryptol. ePrint Arch. 2015: 548 (2015) - [i13]Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai:
Do Distributed Differentially-Private Protocols Require Oblivious Transfer? IACR Cryptol. ePrint Arch. 2015: 1090 (2015) - 2014
- [c28]Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Web PKI: Closing the Gap between Guidelines and Practices. NDSS 2014 - [i12]Ilya Mironov, Noah Stephens-Davidowitz:
Cryptographic Reverse Firewalls. IACR Cryptol. ePrint Arch. 2014: 758 (2014) - 2013
- [j3]Krishnaram Kenthapadi, Aleksandra Korolova, Ilya Mironov, Nina Mishra:
Privacy via the Johnson-Lindenstrauss Transform. J. Priv. Confidentiality 5(1) (2013) - [c27]Vipul Goyal, Ilya Mironov, Omkant Pandey, Amit Sahai:
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols. CRYPTO (1) 2013: 298-315 - [c26]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. CRYPTO (1) 2013: 374-391 - [c25]Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Global Authentication in an Untrustworthy World. HotOS 2013 - 2012
- [c24]Ilya Mironov:
On significance of the least significant bits for differential privacy. CCS 2012: 650-661 - [c23]Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan:
Differential Privacy with Imperfect Randomness. CRYPTO 2012: 497-516 - [c22]Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev:
Incremental Deterministic Public-Key Encryption. EUROCRYPT 2012: 628-644 - [c21]Ilya Mironov:
Differential privacy as a protocol constraint. ITW 2012: 81-83 - [i11]Krishnaram Kenthapadi, Aleksandra Korolova, Ilya Mironov, Nina Mishra:
Privacy via the Johnson-Lindenstrauss Transform. CoRR abs/1204.2606 (2012) - [i10]Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev:
Incremental Deterministic Public-Key Encryption. IACR Cryptol. ePrint Arch. 2012: 47 (2012) - [i9]Yevgeniy Dodis, Adriana López-Alt, Ilya Mironov, Salil P. Vadhan:
Differential Privacy with Imperfect Randomness. IACR Cryptol. ePrint Arch. 2012: 435 (2012) - 2011
- [j2]Ilya Mironov, Moni Naor, Gil Segev:
Sketching in Adversarial Environments. SIAM J. Comput. 40(6): 1845-1870 (2011) - [c20]Roy D'Souza, David Jao, Ilya Mironov, Omkant Pandey:
Publicly Verifiable Secret Sharing for Cloud-Based Key Management. INDOCRYPT 2011: 290-309 - [i8]Andrew McGregor, Ilya Mironov, Toniann Pitassi, Omer Reingold, Kunal Talwar, Salil P. Vadhan:
The Limits of Two-Party Differential Privacy. Electron. Colloquium Comput. Complex. TR11 (2011) - 2010
- [c19]Andrew McGregor, Ilya Mironov, Toniann Pitassi, Omer Reingold, Kunal Talwar, Salil P. Vadhan:
The Limits of Two-Party Differential Privacy. FOCS 2010: 81-90 - [c18]Ilya Mironov:
Domain Extension for Enhanced Target Collision-Resistant Hash Functions. FSE 2010: 153-167
2000 – 2009
- 2009
- [c17]Ilya Mironov, Omkant Pandey, Omer Reingold, Salil P. Vadhan:
Computational Differential Privacy. CRYPTO 2009: 126-142 - [c16]Frank McSherry, Ilya Mironov:
Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. KDD 2009: 627-636 - 2008
- [j1]Philippe Golle, Frank McSherry, Ilya Mironov:
Data Collection with Self-Enforcing Privacy. ACM Trans. Inf. Syst. Secur. 12(2): 9:1-9:24 (2008) - [c15]Ilya Mironov, Moni Naor, Gil Segev:
Sketching in adversarial environments. STOC 2008: 651-660 - 2007
- [c14]Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. CT-RSA 2007: 1-19 - 2006
- [c13]Ilya Mironov, Anton Mityagin, Kobbi Nissim:
Hard Instances of the Constrained Discrete Logarithm Problem. ANTS 2006: 582-598 - [c12]Philippe Golle, Frank McSherry, Ilya Mironov:
Data collection with self-enforcing privacy. CCS 2006: 69-78 - [c11]Joseph Bonneau, Ilya Mironov:
Cache-Collision Timing Attacks Against AES. CHES 2006: 201-215 - [c10]Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor:
Our Data, Ourselves: Privacy Via Distributed Noise Generation. EUROCRYPT 2006: 486-503 - [c9]Ilya Mironov:
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. Public Key Cryptography 2006: 140-156 - [c8]Ilya Mironov, Lintao Zhang:
Applications of SAT Solvers to Cryptanalysis of Hash Functions. SAT 2006: 102-115 - [i7]Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A new word based stream cipher using rapid mixing and revolving buffers. CoRR abs/cs/0610048 (2006) - [i6]Ilya Mironov, Anton Mityagin, Kobbi Nissim:
Hard Instances of the Constrained Discrete Logarithm Problem. CoRR abs/math/0606771 (2006) - [i5]Ilya Mironov, Anton Mityagin, Kobbi Nissim:
Hard Instances of the Constrained Discrete Logarithm Problem. IACR Cryptol. ePrint Arch. 2006: 253 (2006) - [i4]Ilya Mironov, Lintao Zhang:
Applications of SAT Solvers to Cryptanalysis of Hash Functions. IACR Cryptol. ePrint Arch. 2006: 254 (2006) - [i3]Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan:
MV3: A new word based stream cipher using rapid mixing and revolving buffers. IACR Cryptol. ePrint Arch. 2006: 341 (2006) - 2004
- [b1]Ilya Mironov:
Application of analysis of algorithms in cryptography. Stanford University, USA, 2004 - 2003
- [c7]Dan Boneh, Ilya Mironov, Victor Shoup:
A Secure Signature Scheme from Bilinear Maps. CT-RSA 2003: 98-110 - 2002
- [c6]Ilya Mironov:
(Not So) Random Shuffles of RC4. CRYPTO 2002: 304-319 - [c5]Philippe Golle, Stanislaw Jarecki, Ilya Mironov:
Cryptographic Primitives Enforcing Communication and Storage Complexity. Financial Cryptography 2002: 120-135 - [i2]Ilya Mironov:
(Not So) Random Shuffles of RC4. IACR Cryptol. ePrint Arch. 2002: 67 (2002) - 2001
- [c4]Philippe Golle, Ilya Mironov:
Uncheatable Distributed Computations. CT-RSA 2001: 425-440 - [c3]Ilya Mironov:
Hash Functions: From Merkle-Damgård to Shoup. EUROCRYPT 2001: 166-181 - [c2]Philippe Golle, Kevin Leyton-Brown, Ilya Mironov:
Incentives for sharing in peer-to-peer networks. EC 2001: 264-267 - [c1]Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge:
Incentives for Sharing in Peer-to-Peer Networks. WELCOM 2001: 75-87 - [i1]Ilya Mironov:
A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme. IACR Cryptol. ePrint Arch. 2001: 5 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint