Towards evaluating the robustness of neural networks N Carlini, D Wagner 2017 ieee symposium on security and privacy (sp), 39-57, 2017 | 9371 | 2017 |
Practical techniques for searches on encrypted data DX Song, D Wagner, A Perrig Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000 | 5047 | 2000 |
Secure routing in wireless sensor networks: Attacks and countermeasures C Karlof, D Wagner Ad hoc networks 1 (2-3), 293-315, 2003 | 4924 | 2003 |
Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples A Athalye, N Carlini, D Wagner International conference on machine learning, 274-283, 2018 | 3407 | 2018 |
TinySec: a link layer security architecture for wireless sensor networks C Karlof, N Sastry, D Wagner Proceedings of the 2nd international conference on Embedded networked sensor …, 2004 | 2348 | 2004 |
Security in wireless sensor networks A Perrig, J Stankovic, D Wagner Communications of the ACM 47 (6), 53-57, 2004 | 2207 | 2004 |
Android permissions demystified AP Felt, E Chin, S Hanna, D Song, D Wagner Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 2110 | 2011 |
Adversarial examples are not easily detected: Bypassing ten detection methods N Carlini, D Wagner Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017 | 1983 | 2017 |
Intercepting mobile communications: The insecurity of 802.11 N Borisov, I Goldberg, D Wagner Proceedings of the 7th annual international conference on Mobile computing …, 2001 | 1570 | 2001 |
Android permissions: User attention, comprehension, and behavior AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner Proceedings of the eighth symposium on usable privacy and security, 1-14, 2012 | 1495 | 2012 |
Cooperative caching: Using remote client memory to improve file system performance MD Dahlin, RY Wang, TE Anderson, DA Patterson Proceedings of the 1st USENIX conference on Operating Systems Design and …, 1994 | 1353* | 1994 |
Hidden voice commands N Carlini, P Mishra, T Vaidya, Y Zhang, M Sherr, C Shields, D Wagner, ... 25th USENIX security symposium (USENIX security 16), 513-530, 2016 | 1324* | 2016 |
Analyzing inter-application communication in Android E Chin, AP Felt, K Greenwood, D Wagner Proceedings of the 9th international conference on Mobile systems …, 2011 | 1307 | 2011 |
Audio adversarial examples: Targeted attacks on speech-to-text N Carlini, D Wagner 2018 IEEE security and privacy workshops (SPW), 1-7, 2018 | 1257 | 2018 |
Private circuits: Securing hardware against probing attacks Y Ishai, A Sahai, D Wagner Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003 | 1178 | 2003 |
A survey of mobile malware in the wild AP Felt, M Finifter, E Chin, S Hanna, D Wagner Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 1153 | 2011 |
Privacy and security in library RFID: Issues, practices, and architectures D Molnar, D Wagner Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 1103 | 2004 |
Mimicry attacks on host-based intrusion detection systems D Wagner, P Soto Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 1092 | 2002 |
Intrusion detection via static analysis D Wagner, R Dean Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 156-168, 2000 | 1089 | 2000 |
A first step towards automated detection of buffer overrun vulnerabilities. DA Wagner, JS Foster, EA Brewer, A Aiken NDSS 20 (0), 0, 2000 | 1089 | 2000 |