Her main research concerns Computer security, Cloud computing, Cloud storage, Computer network and Retrievability. Her Computer security study frequently intersects with other fields, such as Virtual machine. Her Cloud computing research incorporates themes from CPU cache and Key.
Her Cloud storage study frequently links to adjacent areas such as Adversary. Her Adversary study deals with Distributed computing intersecting with Server. Her Computer network research includes elements of Cloud data and Cloud computing security.
Alina Oprea mostly deals with Computer security, Computer network, Cryptography, Cloud computing and Artificial intelligence. Her work in the fields of Computer security, such as Malware, Backdoor, Password and Secrecy, intersects with other areas such as Compromise. Her Encryption, Server and Public-key cryptography study in the realm of Computer network interacts with subjects such as Interface.
Alina Oprea has researched Server in several fields, including Byte and File size. Her research integrates issues of Adversary, Key and Distributed computing in her study of Cryptography. Her work deals with themes such as Virtual machine and Scalability, which intersect with Cloud computing.
Her primary scientific interests are in Artificial intelligence, Computer security, Machine learning, Malware and Backdoor. In Artificial intelligence, Alina Oprea works on issues like Exploit, which are connected to Database. Her Computer security study incorporates themes from Adversarial system and The Internet.
Her study in Robustness is interdisciplinary in nature, drawing from both Adversary and Temporal difference learning. Alina Oprea has included themes like Information retrieval, Personally identifiable information and Code in her Adversary study. Her studies deal with areas such as Computer security model, Distributed computing and Cluster analysis as well as Cryptography.
Alina Oprea mainly investigates Computer security, Backdoor, Differential privacy, Evasion and Inference. In most of her Computer security studies, her work intersects topics such as Adversarial system. Her Backdoor study combines topics from a wide range of disciplines, such as Watermark, Malware and Digital watermarking.
Her Differential privacy research is multidisciplinary, incorporating perspectives in Complement, Theoretical computer science and Internet privacy. She interconnects Surrogate model and Vulnerability in the investigation of issues within Evasion. Her Inference study frequently draws connections to other fields, such as Variety.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
HAIL: a high-availability and integrity layer for cloud storage
Kevin D. Bowers;Ari Juels;Alina Oprea.
computer and communications security (2009)
Proofs of retrievability: theory and implementation
Kevin D. Bowers;Ari Juels;Alina Oprea.
ieee international conference on cloud computing technology and science (2009)
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis
Yinqian Zhang;Ari Juels;Alina Oprea;Michael K. Reiter.
ieee symposium on security and privacy (2011)
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
Matthew Jagielski;Alina Oprea;Battista Biggio;Chang Liu.
ieee symposium on security and privacy (2018)
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks
Ting-Fang Yen;Alina Oprea;Kaan Onarlioglu;Todd Leetham.
annual computer security applications conference (2013)
FlipIt: The Game of Stealthy Takeover
Marten Dijk;Ari Juels;Alina Oprea;Ronald L. Rivest.
Journal of Cryptology (2013)
Iris: a scalable cloud file system with efficient integrity checks
Emil Stefanov;Marten van Dijk;Ari Juels;Alina Oprea.
annual computer security applications conference (2012)
New approaches to security and availability for cloud data
Ari Juels;Alina Oprea.
Communications of The ACM (2013)
Detection of malicious web activity in enterprise computer networks
Alina M. Oprea;Zhou Li;Robin Norris;Kevin D. Bowers.
Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data
Alina Oprea;Zhou Li;Ting-Fang Yen;Sang H. Chin.
dependable systems and networks (2015)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: