David Wagner
David Wagner
Professor of Computer Science, UC Berkeley
Geverifieerd e-mailadres voor cs.berkeley.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Secure routing in wireless sensor networks: Attacks and countermeasures
C Karlof, D Wagner
Ad hoc networks 1 (2-3), 293-315, 2003
43882003
Practical techniques for searches on encrypted data
DX Song, D Wagner, A Perrig
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 44-55, 2000
34692000
Towards evaluating the robustness of neural networks
N Carlini, D Wagner
2017 ieee symposium on security and privacy (sp), 39-57, 2017
23252017
TinySec: a link layer security architecture for wireless sensor networks
C Karlof, N Sastry, D Wagner
Proceedings of the 2nd international conference on Embedded networked sensor …, 2004
21372004
Security in wireless sensor networks
A Perrig, J Stankovic, D Wagner
Communications of the ACM 47 (6), 53-57, 2004
19382004
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
16542011
Intercepting mobile communications: the insecurity of 802.11
N Borisov, I Goldberg, D Wagner
Proceedings of the 7th annual international conference on Mobile computing …, 2001
14642001
Analyzing inter-application communication in Android
E Chin, AP Felt, K Greenwood, D Wagner
Proceedings of the 9th international conference on Mobile systems …, 2011
11052011
Android permissions: User attention, comprehension, and behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
Proceedings of the eighth symposium on usable privacy and security, 1-14, 2012
10752012
Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples
A Athalye, N Carlini, D Wagner
arXiv preprint arXiv:1802.00420, 2018
9852018
Privacy and security in library RFID: Issues, practices, and architectures
D Molnar, D Wagner
Proceedings of the 11th ACM conference on Computer and communications …, 2004
9822004
Intrusion detection via static analysis
D Wagner, R Dean
Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 156-168, 2000
9792000
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
9732011
A first step towards automated detection of buffer overrun vulnerabilities.
DA Wagner, JS Foster, EA Brewer, A Aiken
NDSS 20 (0), 0, 2000
9672000
A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker
I Goldberg, D Wagner, R Thomas, EA Brewer
Proceedings of the 5th USENIX Security Symposium, 1996
9431996
Mimicry attacks on host-based intrusion detection systems
D Wagner, P Soto
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
9022002
Secure verification of location claims
N Sastry, U Shankar, D Wagner
Proceedings of the 2nd ACM workshop on Wireless security, 1-10, 2003
8562003
Analysis of the SSL 3.0 protocol
D Wagner, B Schneier
The Second USENIX Workshop on Electronic Commerce Proceedings 1 (1), 29-40, 1996
7301996
Adversarial examples are not easily detected: Bypassing ten detection methods
N Carlini, D Wagner
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security …, 2017
7132017
Private circuits: Securing hardware against probing attacks
Y Ishai, A Sahai, D Wagner
Annual International Cryptology Conference, 463-481, 2003
6962003
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20