Data-free model extraction JB Truong, P Maini, RJ Walls, N Papernot Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 177 | 2021 |
Building an Ontology of Cyber Security A Oltramari, LF Cranor, RJ Walls, P McDaniel Proc. Intl. Conference on Semantic Technologies for Intelligence, Defense …, 2014 | 125 | 2014 |
Domain-z: 28 registrations later measuring the exploitation of residual trust in domains C Lever, R Walls, Y Nadji, D Dagon, P McDaniel, M Antonakakis 2016 IEEE symposium on security and privacy (SP), 691-706, 2016 | 99 | 2016 |
Malware traffic detection using tamper resistant features ZB Celik, RJ Walls, P McDaniel, A Swami MILCOM 2015-2015 IEEE Military Communications Conference, 330-335, 2015 | 75 | 2015 |
Forensic Triage for Mobile Phones with {DEC0DE} RJ Walls, E Learned-Miller, BN Levine 20th USENIX Security Symposium (USENIX Security 11), 2011 | 60 | 2011 |
Control-flow integrity for real-time embedded systems RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward 31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019 | 59 | 2019 |
Silhouette: Efficient protected shadow stacks for embedded systems J Zhou, Y Du, Z Shen, L Ma, J Criswell, RJ Walls 29th USENIX Security Symposium (USENIX Security 20), 1219-1236, 2020 | 58 | 2020 |
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping R Walls Computer Science & Engineering, 2009 | 54 | 2009 |
Measurement and analysis of child pornography trafficking on P2P networks R Hurley, S Prusty, H Soroush, RJ Walls, J Albrecht, E Cecchet, ... Proceedings of the 22nd international conference on World Wide Web, 631-642, 2013 | 52 | 2013 |
Measuring the impact and perception of acceptable advertisements RJ Walls, ED Kilmer, N Lageman, PD McDaniel Proceedings of the 2015 Internet Measurement Conference, 107-120, 2015 | 48 | 2015 |
Effective Digital Forensics Research Is {Investigator-Centric} RJ Walls, BN Levine, M Liberatore, C Shields 6th USENIX Workshop on Hot Topics in Security (HotSec 11), 2011 | 35 | 2011 |
Confidential deep learning: Executing proprietary models on untrusted devices PM VanNostrand, I Kyriazis, M Cheng, T Guo, RJ Walls arXiv preprint arXiv:1908.10730, 2019 | 33 | 2019 |
Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls, J Criswell | 25 | 2022 |
Characterizing and modeling distributed training with transient cloud GPU servers S Li, RJ Walls, T Guo 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 23 | 2020 |
Computational Ontology of Network Operations A Oltramari, L Cranor, RJ Walls, P McDaniel MILCOM 2015, 2015 | 21 | 2015 |
Security and science of agility P McDaniel, T Jaeger, TF La Porta, N Papernot, RJ Walls, A Kott, L Marvel, ... Proceedings of the First ACM Workshop on Moving Target Defense, 13-19, 2014 | 20 | 2014 |
Speeding up deep learning with transient servers S Li, RJ Walls, L Xu, T Guo 2019 IEEE International Conference on Autonomic Computing (ICAC), 125-135, 2019 | 18 | 2019 |
Characterizing concurrency mechanisms for nvidia gpus under deep learning workloads G Gilman, RJ Walls ACM SIGMETRICS Performance Evaluation Review 49 (3), 32-34, 2022 | 17 | 2022 |
Demystifying the placement policies of the NVIDIA GPU thread block scheduler for concurrent kernels G Gilman, SS Ogden, T Guo, RJ Walls ACM SIGMETRICS Performance Evaluation Review 48 (3), 81-88, 2021 | 17 | 2021 |
BinDNN: Resilient Function Matching Using Deep Learning N Lageman, ED Kilmer, RJ Walls, PD McDaniel Security and Privacy in Communication Networks: 12th International …, 2017 | 16 | 2017 |