Advances and open problems in federated learning P Kairouz, HB McMahan, B Avent, A Bellet, M Bennis, AN Bhagoji, ... Foundations and trends® in machine learning 14 (1–2), 1-210, 2021 | 5167 | 2021 |
Practical techniques for searches on encrypted data DX Song, D Wagner, A Perrig Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 44-55, 2000 | 5025 | 2000 |
Random key predistribution schemes for sensor networks H Chan, A Perrig, D Song 2003 Symposium on Security and Privacy, 2003., 197-213, 2003 | 4414 | 2003 |
Provable data possession at untrusted stores G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ... Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 3976 | 2007 |
Robust physical-world attacks on deep learning visual classification K Eykholt, I Evtimov, E Fernandes, B Li, A Rahmati, C Xiao, A Prakash, ... Proceedings of the IEEE conference on computer vision and pattern …, 2018 | 2904* | 2018 |
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. J Newsome, DX Song NDSS 5, 3-4, 2005 | 2416 | 2005 |
The sybil attack in sensor networks: analysis & defenses J Newsome, E Shi, D Song, A Perrig Proceedings of the 3rd international symposium on Information processing in …, 2004 | 2159 | 2004 |
Android permissions demystified AP Felt, E Chin, S Hanna, D Song, D Wagner Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 2109 | 2011 |
Delving into transferable adversarial examples and black-box attacks Y Liu, X Chen, C Liu, D Song arXiv preprint arXiv:1611.02770, 2016 | 1881 | 2016 |
Targeted backdoor attacks on deep learning systems using data poisoning X Chen, C Liu, B Li, K Lu, D Song arXiv preprint arXiv:1712.05526, 2017 | 1619 | 2017 |
On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1576 | 2016 |
Efficient authentication and signing of multicast streams over lossy channels A Perrig, R Canetti, JD Tygar, D Song Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, 56-73, 2000 | 1445 | 2000 |
Advanced and authenticated marking schemes for IP traceback DX Song, A Perrig Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 1321 | 2001 |
Polygraph: Automatically generating signatures for polymorphic worms J Newsome, B Karp, D Song 2005 IEEE Symposium on Security and Privacy (S&P'05), 226-241, 2005 | 1257 | 2005 |
The many faces of robustness: A critical analysis of out-of-distribution generalization D Hendrycks, S Basart, N Mu, S Kadavath, F Wang, E Dorundo, R Desai, ... Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 1248 | 2021 |
Extracting training data from large language models N Carlini, F Tramer, E Wallace, M Jagielski, A Herbert-Voss, K Lee, ... 30th USENIX Security Symposium (USENIX Security 21), 2633-2650, 2021 | 1211 | 2021 |
Natural adversarial examples D Hendrycks, K Zhao, S Basart, J Steinhardt, D Song Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 1176 | 2021 |
Semantics-aware malware detection M Christodorescu, S Jha, SA Seshia, D Song, RE Bryant 2005 IEEE symposium on security and privacy (S&P'05), 32-46, 2005 | 1152 | 2005 |
Panorama: capturing system-wide information flow for malware detection and analysis H Yin, D Song, M Egele, C Kruegel, E Kirda Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 1128 | 2007 |
SIA: Secure information aggregation in sensor networks B Przydatek, D Song, A Perrig Proceedings of the 1st international conference on Embedded networked sensor …, 2003 | 1127 | 2003 |
Measuring massive multitask language understanding D Hendrycks, C Burns, S Basart, A Zou, M Mazeika, D Song, J Steinhardt arXiv preprint arXiv:2009.03300, 2020 | 1125 | 2020 |
BitBlaze: A new approach to computer security via binary analysis D Song, D Brumley, H Yin, J Caballero, I Jager, MG Kang, Z Liang, ... Information Systems Security: 4th International Conference, ICISS 2008 …, 2008 | 1076 | 2008 |
Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication M Frank, R Biedert, E Ma, I Martinovic, D Song IEEE transactions on information forensics and security 8 (1), 136-148, 2012 | 1028 | 2012 |
Sok: Eternal war in memory L Szekeres, M Payer, T Wei, D Song 2013 IEEE Symposium on Security and Privacy, 48-62, 2013 | 1003 | 2013 |
Privacy-preserving set operations L Kissner, D Song Annual International Cryptology Conference, 241-257, 2005 | 999 | 2005 |
Efficient and secure source authentication for multicast A Perrig, R Canetti, D Song, JD Tygar Network and distributed system security symposium, NDSS 1 (2001), 35-46, 2001 | 981 | 2001 |
The secret sharer: Evaluating and testing unintended memorization in neural networks N Carlini, C Liu, Ú Erlingsson, J Kos, D Song 28th USENIX security symposium (USENIX security 19), 267-284, 2019 | 977 | 2019 |
Using self-supervised learning can improve model robustness and uncertainty D Hendrycks, M Mazeika, S Kadavath, D Song Advances in neural information processing systems 32, 2019 | 961 | 2019 |
Generating adversarial examples with adversarial networks C Xiao, B Li, JY Zhu, W He, M Liu, D Song arXiv preprint arXiv:1801.02610, 2018 | 934 | 2018 |
The honey badger of BFT protocols A Miller, Y Xia, K Croman, E Shi, D Song Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 923 | 2016 |
Privacy-preserving aggregation of time-series data E Shi, HTH Chan, E Rieffel, R Chow, D Song Annual Network & Distributed System Security Symposium (NDSS), 2011 | 831 | 2011 |
Characterizing adversarial subspaces using local intrinsic dimensionality X Ma, B Li, Y Wang, SM Erfani, S Wijewickrema, G Schoenebeck, D Song, ... arXiv preprint arXiv:1801.02613, 2018 | 779 | 2018 |
Model-contrastive federated learning Q Li, B He, D Song Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021 | 746 | 2021 |
Timing analysis of keystrokes and timing attacks on {SSH} DX Song, D Wagner, X Tian 10th USENIX Security Symposium (USENIX Security 01), 2001 | 746 | 2001 |
Multi-dimensional range query over encrypted data E Shi, J Bethencourt, THH Chan, D Song, A Perrig 2007 IEEE Symposium on Security and Privacy (SP'07), 350-364, 2007 | 733 | 2007 |
Practical control flow integrity and randomization for binary executables C Zhang, T Wei, Z Chen, L Duan, L Szekeres, S McCamant, D Song, ... 2013 IEEE symposium on security and privacy, 559-573, 2013 | 705 | 2013 |
Neural network-based graph embedding for cross-platform binary code similarity detection X Xu, C Liu, Q Feng, H Yin, L Song, D Song Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 670 | 2017 |
Design and evaluation of a real-time url spam filtering service K Thomas, C Grier, J Ma, V Paxson, D Song 2011 IEEE symposium on security and privacy, 447-462, 2011 | 668 | 2011 |
Code-pointer integrity V Kuznetzov, L Szekeres, M Payer, G Candea, R Sekar, D Song The Continuing Arms Race: Code-Reuse Attacks and Defenses, 81-116, 2018 | 649 | 2018 |
Pi: A path identification mechanism to defend against DDoS attacks A Yaar, A Perrig, D Song 2003 Symposium on Security and Privacy, 2003., 93-107, 2003 | 632 | 2003 |