On the effectiveness of secret key extraction from wireless signal strength in real environments S Jana, SN Premnath, M Clark, SK Kasera, N Patwari, SV Krishnamurthy Proceedings of the 15th annual international conference on Mobile computing …, 2009 | 679 | 2009 |
Secret key extraction from wireless signal strength in real environments SN Premnath, S Jana, J Croft, PL Gowda, M Clark, SK Kasera, N Patwari, ... IEEE Transactions on mobile Computing 12 (5), 917-930, 2012 | 387 | 2012 |
Transferable multiparty computation MR Clark, KM Hopkinson US Patent 9,813,234, 2017 | 39 | 2017 |
Dynamic, Privacy-Preserving Decentralized Reputation Systems MR Clark, K Stewart, KM Hopkinson IEEE Transactions on Mobile Computing 16 (9), 2506-2517, 2017 | 35 | 2017 |
Adversarial Machine Learning for Enhanced Spread Spectrum Communications M Fadul, DR Reising, KT Arasu, MR Clark IEEE Military Communications Conference, 2021 | 17 | 2021 |
Robust Wireless Channel Based Secret Key Extraction M Clark MILITARY COMMUNICATIONS CONFERENCE, 2012-MILCOM 2012, 1-6, 2012 | 14 | 2012 |
Transferable Multiparty Computation with Applications to the Smart Grid M Clark, K Hopkinson Transactions on Information Forensics and Security 9 (9), 1356-1366, 2014 | 13 | 2014 |
Chaos engineering experiments in middleware systems using targeted network degradation and automatic fault injection T Pierce, J Schanck, A Groeger, R Salih, MR Clark Open Architecture/Open Business Model Net-Centric Systems and Defense …, 2021 | 7 | 2021 |
Towards an understanding of the tradeoffs in adversary models of smart grid privacy protocols MR Clark, KM Hopkinson 2013 IEEE Power & Energy Society General Meeting, 1-5, 2013 | 7 | 2013 |
Measuring resiliency of system of systems using chaos engineering experiments T Bailey, P Marchione, P Swartz, R Salih, MR Clark, R Denz Disruptive Technologies in Information Sciences VI 12117, 20-32, 2022 | 5 | 2022 |
Unimodular Perfect and Nearly Perfect Sequences: A Variation of Björck’s Scheme KT Arasu, MR Clark, JR Hollon IEEE Transactions on Information Theory, 2022 | 3 | 2022 |
Towards Black-box Image Extraction Attacks on RBF SVM Classification Model M Clark, P Swartz, A Alten, R Salih EdgeSP: The Third ACM/IEEE Workshop on Security and Privacy in Edge Computing, 2020 | 2 | 2020 |
No Classifier Left Behind: An In-depth Study of the RBF SVM Classifier’s Vulnerability to Image Extraction Attacks via Confidence Information Exploitation M Clark, P Swartz, A Alten, R Salih The Second IEEE International Conference on Cognitive Machine Intelligence, 2020 | 1 | 2020 |
Protecting publish/subscribe interactions via TLS and a system-wide certificate validation engine A Pierce, A Alten, MR Clark Unmanned Systems Technology XXII, 2020 | 1 | 2020 |
A New Class of Optimal Frequency Hopping Sequences with Applications to Secure Communication Waveforms KT Arasu, MR Clark, TM McManus 2023 33rd International Telecommunication Networks and Applications …, 2023 | | 2023 |
Support emergency response in automatic identification system using an opportunistic resource utilization networks A Griesdorn, Q Hirt, R Salih, MR Clark, S Brookes Automatic Target Recognition XXXIII 12521, 187-191, 2023 | | 2023 |
Adversarial robustness of machine learning-based indoor positioning systems P Swartz, K Hobbs, L Hancock, R Salih, MR Clark Disruptive Technologies in Information Sciences V 11751, 58-70, 2021 | | 2021 |
Overhead analysis of the utilization of hardware assisted virtualization for protecting guest operating system applications MR Clark Cyber Sensing 2018 10630, 37-43, 2018 | | 2018 |
A graph-theoretic understanding of network-wide implications of local cyber protections for mission assurance S Lane, MR Clark, M Xue, S Roy, S Warnick Cyber Sensing 2018 10630, 109-115, 2018 | | 2018 |
The Theory and Application of Privacy-preserving Computation MR Clark AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF …, 2015 | | 2015 |