User profiles for Suman Jana
Suman JanaAssociate Professor of Computer Science, Columbia University Verified email at cs.columbia.edu Cited by 12236 |
Nuclear medicine studies of the prostate, testes, and bladder
S Jana, MD Blaufox - Seminars in nuclear medicine, 2006 - Elsevier
During the last decade, there has been a significant advancement in imaging of urologic
diseases. Transrectal ultrasound (TRUS), computerized tomography (CT), magnetic resonance …
diseases. Transrectal ultrasound (TRUS), computerized tomography (CT), magnetic resonance …
Deepxplore: Automated whitebox testing of deep learning systems
Deep learning (DL) systems are increasingly deployed in safety- and security-critical domains
including self-driving cars and malware detection, where the correctness and predictability …
including self-driving cars and malware detection, where the correctness and predictability …
Certified robustness to adversarial examples with differential privacy
Adversarial examples that fool machine learning models, particularly deep neural networks,
have been a topic of intense research interest, with attacks and defenses being developed …
have been a topic of intense research interest, with attacks and defenses being developed …
The most dangerous code in the world: validating SSL certificates in non-browser software
SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications.
Security of SSL connections against an active network attacker depends on correctly validating …
Security of SSL connections against an active network attacker depends on correctly validating …
On the effectiveness of secret key extraction from wireless signal strength in real environments
We evaluate the effectiveness of secret key extraction, for private communication between
two wireless devices, from the received signal strength (RSS) variations on the wireless …
two wireless devices, from the received signal strength (RSS) variations on the wireless …
Formal security analysis of neural networks using symbolic intervals
Due to the increasing deployment of Deep Neural Networks (DNNs) in real-world security-critical
domains including autonomous vehicles and collision avoidance systems, formally …
domains including autonomous vehicles and collision avoidance systems, formally …
Ensuring fairness beyond the training data
We initiate the study of fair classifiers that are robust to perturbations in the training distribution.
Despite recent progress, the literature on fairness has largely ignored the design of fair …
Despite recent progress, the literature on fairness has largely ignored the design of fair …
Learning security classifiers with verified global robustness properties
Many recent works have proposed methods to train classifiers with local robustness properties,
which can provably eliminate classes of evasion attacks for most inputs, but not all inputs. …
which can provably eliminate classes of evasion attacks for most inputs, but not all inputs. …
Deeptest: Automated testing of deep-neural-network-driven autonomous cars
Recent advances in Deep Neural Networks (DNNs) have led to the development of DNN-driven
autonomous cars that, using sensors like camera, LiDAR, etc., can drive without any …
autonomous cars that, using sensors like camera, LiDAR, etc., can drive without any …
High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
Secret keys can be generated and shared between two wireless nodes by measuring and
encoding radio channel characteristics without ever revealing the secret key to an …
encoding radio channel characteristics without ever revealing the secret key to an …