The limitations of deep learning in adversarial settings N Papernot, P McDaniel, S Jha, M Fredrikson, ZB Celik, A Swami 2016 IEEE European symposium on security and privacy (EuroS&P), 372-387, 2016 | 4754 | 2016 |
Practical black-box attacks against machine learning N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 4016 | 2017 |
Practical black-box attacks against deep learning systems using adversarial examples N Papernot, P McDaniel, I Goodfellow, S Jha, ZB Celik, A Swami arXiv preprint arXiv:1602.02697 1 (2), 3, 2016 | 507 | 2016 |
Soteria: Automated IoT Safety and Security Analysis ZB Celik, P McDaniel, G Tan 2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18), 2018 | 315 | 2018 |
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT ZB Celik, G Tan, P McDaniel Network and Distributed System Security Symposium (NDSS), 2019 | 281 | 2019 |
Sensitive Information Tracking in Commodity IoT ZB Celik, L Babun, AK Sikder, H Aksu, G Tan, P McDaniel, AS Uluagac 27th {USENIX} Security Symposium ({USENIX} Security 18, 2018 | 279 | 2018 |
A survey on IoT platforms: Communication, security, and privacy perspectives L Babun, K Denney, ZB Celik, P McDaniel, AS Uluagac Computer Networks 192, 108040, 2021 | 189 | 2021 |
Machine Learning in Adversarial Settings P McDaniel, N Papernot, ZB Celik IEEE Security & Privacy Magazine 14 (3), 2016 | 177 | 2016 |
Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities ZB Celik, E Fernandes, E Pauley, G Tan, PD McDaniel ACM Computing Surveys (CSUR), 2019 | 159 | 2019 |
ATLAS: A Sequence-based Learning Approach for Attack Investigation A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu USENIX Security Symposium, 2021 | 149 | 2021 |
What Do You See? Evaluation of Explainable Artificial Intelligence (XAI) Interpretability through Neural Backdoors YS Lin, WC Lee, ZB Celik ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD), 2021 | 87 | 2021 |
Kratos: Multi-user multi-device-aware access control system for the smart home AK Sikder, L Babun, ZB Celik, A Acar, H Aksu, P McDaniel, E Kirda, ... Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 78 | 2020 |
Malware Traffic Detection using Tamper Resistant Features ZB Celik, RJ Walls, P McDaniel, A Swami Military Communications Conference, MILCOM, 2015 | 74 | 2015 |
Real-time analysis of privacy-(un) aware IoT applications L Babun, ZB Celik, P McDaniel, AS Uluagac Privacy Enhancing Technologies Symposium (PETS), 2021 | 54 | 2021 |
Evading Voltage-Based Intrusion Detection on Automotive CAN R Bhatia, V Kumar, K Serag, ZB Celik, M Payer, D Xu Network and Distributed System Security Symposium (NDSS), 2021 | 46 | 2021 |
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles H Kim, MO Ozmen, A Bianchi, ZB Celik, D Xu Network and Distributed System Security Symposium (NDSS), 2021 | 45 | 2021 |
Salting public traces with attack traffic to test flow classifiers ZB Celik, J Raghuram, G Kesidis, DJ Miller In USENIX 4th CSET Workshop, 2011 | 44 | 2011 |
Verifying internet of things safety and security in physical spaces ZB Celik, P McDaniel, G Tan, L Babun, AS Uluagac IEEE Security & Privacy 17 (5), 30-37, 2019 | 38 | 2019 |
Detection of fast-flux networks using various DNS feature sets ZB Celik, S Oktug IEEE Symposium on Computers and Communications (ISCC), 2013, 000868-000873, 2013 | 37 | 2013 |
Discovering IoT physical channel vulnerabilities MO Ozmen, X Li, A Chu, ZB Celik, B Hoxha, X Zhang ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022 | 30* | 2022 |