Παρακολούθηση
David Wagner
David Wagner
Professor of Computer Science, UC Berkeley
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα cs.berkeley.edu - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Towards evaluating the robustness of neural networks
N Carlini, D Wagner
2017 ieee symposium on security and privacy (sp), 39-57, 2017
100862017
Practical techniques for searches on encrypted data
DX Song, D Wagner, A Perrig
Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000
52062000
Secure routing in wireless sensor networks: Attacks and countermeasures
C Karlof, D Wagner
Ad hoc networks 1 (2-3), 293-315, 2003
49712003
Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples
A Athalye, N Carlini, D Wagner
International conference on machine learning, 274-283, 2018
36002018
TinySec: a link layer security architecture for wireless sensor networks
C Karlof, N Sastry, D Wagner
Proceedings of the 2nd international conference on Embedded networked sensor …, 2004
23672004
Security in wireless sensor networks
A Perrig, J Stankovic, D Wagner
Communications of the ACM 47 (6), 53-57, 2004
22262004
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
21432011
Adversarial examples are not easily detected: Bypassing ten detection methods
N Carlini, D Wagner
Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017
20832017
Intercepting mobile communications: The insecurity of 802.11
N Borisov, I Goldberg, D Wagner
Proceedings of the 7th annual international conference on Mobile computing …, 2001
15772001
Android permissions: User attention, comprehension, and behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
Proceedings of the eighth symposium on usable privacy and security, 1-14, 2012
15262012
Hidden voice commands
N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ...
25th USENIX security symposium (USENIX security 16), 513-530, 2016
1379*2016
Cooperative caching: Using remote client memory to improve file system performance
MD Dahlin, RY Wang, TE Anderson, DA Patterson
Proceedings of the 1st USENIX conference on Operating Systems Design and …, 1994
1372*1994
Audio adversarial examples: Targeted attacks on speech-to-text
N Carlini, D Wagner
2018 IEEE security and privacy workshops (SPW), 1-7, 2018
13382018
Analyzing inter-application communication in Android
E Chin, AP Felt, K Greenwood, D Wagner
Proceedings of the 9th international conference on Mobile systems …, 2011
13212011
Private circuits: Securing hardware against probing attacks
Y Ishai, A Sahai, D Wagner
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
12252003
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
11622011
Privacy and security in library RFID: Issues, practices, and architectures
D Molnar, D Wagner
Proceedings of the 11th ACM conference on Computer and communications …, 2004
11072004
Mimicry attacks on host-based intrusion detection systems
D Wagner, P Soto
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
11032002
A first step towards automated detection of buffer overrun vulnerabilities.
DA Wagner, JS Foster, EA Brewer, A Aiken
NDSS 20 (0), 0, 2000
10942000
Intrusion detection via static analysis
D Wagner, R Dean
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 156-168, 2000
10922000
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20